Slowinska A,Stancescu T,Bos H.Body armor for binaries:preventing buffer overflows without recompilation[C]//Proceedings of 2012USENIX Annual Technical Conference,Boston:USENIX Association,2012.
[2]
Comparetti P,Wondracek G,Kruegel C,et al.Prospex:Protocol specification extraction[C]//Proceedings of IEEE Symposium on Security and Privacy,Oakland:IEEE Computer Society Press,2009:110-125.
[3]
Slowinska A,Stancescu T,Bos H.Howard:A dynamic excavator for reverse engineering data structures[C]//2011 Network and Distributed System Security Symposium.San Diego,2011.
[4]
Wang T,Wei T,Gu G,et al.TaintScope:A checksum-aware directed fuzzing tool for automatic software vulnerability detection[C]//Proceedings of IEEE Symposium on Security and Privacy,Oakland:IEEE Computer Society Press,2010:497-512.
[5]
Cui W,Peinado M,Chen W,et al.Tupni:automatic reverse engineering of input formats[C]//Proceedings of the 15th ACM Conference on Computer and Communications Security.Alexandria:ACM Press,2008:391-402.
[6]
Lin Z,Zhang X,Xu D.Automatic reverse engineering of data structures from binary execution[C]//Proceedings of the 17th Network and Distributed System Security Symposium,San Diego:Internet Society(ISOC),2010.
[7]
Lin Z,Zhang X.Reverse engineering input syntactic structure from program execution and its applications[J].IEEE Trans.Softw.Eng.,2010,36(5):688-703.
[8]
Lin Z,Jiang X,Xu D,et al.Automatic protocol format reverse engineering through context-aware monitored execution[C]//Proceedings of Network and Distributed System Security Symposium,San Diego:Internet Society(ISOC),2008.
[9]
Caballero J,Yin H,Liang Z,et al.Polyglot:Automatic extraction of protocol message format using dynamic binary analysis[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York:ACM Press,2007:317-329.
[10]
Song D,Brumley D,Yin H.BitBlaze:A new approach to computer security via binary analysis[C]//Proceedings of the 4th International Conference on Information Systems Security(ICISS 2008).Hyderabad:IEEE CS Press,2008:1-25.
[11]
Yin H,Song D,Egele E,et al,Panorama:capturing system-wide information flow for malware detection and analysis[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.Alexandria:ACM Press,2007:116-127.