Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008. ,
DOI : 10.1109/SP.2008.17
Using code normalization for fighting self-mutating malware, Proceedings of the International Symposium of Secure Software Engineering, 2006. ,
Unassisted and automatic generation of high-coverage tests for complex systems programs, Proceedings of the 2008 USENIX Symposium on Operating Systems Design and Implementation (OSDI'08), 2008. ,
EXE:automatically generating inputs of death, Proceedings of the 2006 ACM Conference on Computer and Communications Security (CCS'06), 2006. ,
Malware normalization, 2005. ,
Introduction to Algorithms, chapter 21: Data structures for Disjoint Sets, pp.498-524, 2001. ,
A Decision Procedure for Bit-Vectors and Arrays, Proceedings of the 2007 International Conference in Computer Aided Verification (CAV'07), 2007. ,
DOI : 10.1007/978-3-540-73368-3_52
URL : http://chicory.stanford.edu/PAPERS/STP-ganesh-07.ps
BinHunt: Automatically Finding Semantic Differences in Binary Programs, Poceedings of the 10th International Conference on Information and Communications Security (ICICS'08), 2008. ,
DOI : 10.1007/978-3-540-73368-3_52
The Superdiversifier: Peephole Individualization for Software Protection, Proceedings of the 3rd International Workshop on Security (IWSEC'08), 2008. ,
DOI : 10.1007/978-3-540-89598-5_7
Towards automatic software lineage inference, Presented as part of the 22nd USENIX Security Symposium (USENIX Security'13), 2013. ,
Learning to detect malicious executables in the wild, Proceedings of the 10th ACM SIGKDD conference, 2004. ,
Lines of malicious code, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, 2012. ,
DOI : 10.1145/2420950.2421001
Denial-of-Service Attacks on Host-Based Generic Unpackers, Proceedings of the 11th International Conference on Information and Communications Security, 2009. ,
DOI : 10.1007/978-3-642-11145-7_19
Semanticsbased obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection, Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE'14), 2014. ,
iBinHunt: Binary hunting with interprocedural control flow, Proceedings of the 15th Annual International Conference on Information Security and Cryptology (ICISC'12), 2012. ,
A study on latent vulnerabilities, Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRD- S'10), 2010. ,
Exposé: Discovering potential binary code reuse, Proceedings of the 37th IEEE Annual Computer Software and Applications Conference (COMPSAC'13), 2013. ,
Annual report 2013 summary, 2010. ,
Binary-code obfuscations in prevalent packer tools, ACM Computing Surveys, vol.46, issue.1, p.2013 ,
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software, 2012. ,
Memoized symbolic execution, Proceedings of the 2012 International Symposium on Software Testing and Analysis, ISSTA 2012, 2012. ,
DOI : 10.1145/2338965.2336771
TEMU: Binary code analysis via whole-system layered annotative execution, 2010. ,