BinSequence, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS '17, 2017. ,
DOI : 10.1145/1572272.1572287
On the Feasibility of Malware Authorship Attrubution, International Symposium on Foundations and Practice of Security, pp.256-272, 2016. ,
SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code, Digital Investigation, pp.61-71, 2015. ,
DOI : 10.1016/j.diin.2015.01.011
A Program Diffing Plugin for IDA Pro, https://github ,
Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions, Communications of the ACM, vol.51, issue.1, pp.117-122, 2008. ,
DOI : 10.1145/1327452.1327494
Code Synchronization by Morphological Analysis. Malicious and Unwanted Software, pp.112-119, 2012. ,
DOI : 10.1109/malware.2012.6461016
URL : https://hal.archives-ouvertes.fr/hal-00764286
BinSlayer, Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop on, PPREW '13, pp.1-410, 2013. ,
DOI : 10.1145/2430553.2430557
Control Flow-Based Malware Variant Detection. Dependable and Secure Computing, IEEE Transactions, vol.11, pp.307-317, 2014. ,
Supervised learning for provenance-similarity of binaries, Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '11, pp.15-23, 2011. ,
DOI : 10.1145/2020408.2020419
DebCheck: Efficient Checking for Open Source Code Clones in Software Systems, 2011 IEEE 19th International Conference on Program Comprehension, pp.217-218, 2011. ,
DOI : 10.1109/ICPC.2011.27
URL : http://research.cs.queensu.ca/home/cordy/Papers/CR-DebCheck-Tool-ICPC11.pdf
Tracelet-Based Code Search in Executables, Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation. PLDI '14, pp.349-360, 2014. ,
DOI : 10.1145/2666356.2594343
Graph-Based Comparison of Executable Objects (english version), SSTIC, vol.5, pp.1-3, 2005. ,
Semantic clone detection using method IOE-behavior, 2012 6th International Workshop on Software Clones (IWSC), pp.80-81, 2012. ,
DOI : 10.1109/IWSC.2012.6227874
BinClone: Detecting Code Clones in Malware, 2014 Eighth International Conference on Software Security and Reliability, pp.78-87, 2014. ,
DOI : 10.1109/SERE.2014.21
Structural detection of android malware using embedded call graphs, Proceedings of the 2013 ACM workshop on Artificial intelligence and security, AISec '13, pp.45-54, 2013. ,
DOI : 10.1145/2517312.2517315
Fast Library Identifiation and Recognition Technology: In-Depth, https ,
Labeling library functions in stripped binaries, Proceedings of the 10th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools, PASTE '11, pp.1-8, 2011. ,
DOI : 10.1145/2024569.2024571
Binary Function Clustering Using Semantic Hashes, 2012 11th International Conference on Machine Learning and Applications, pp.386-391, 2012. ,
DOI : 10.1109/ICMLA.2012.70
Obfuscator-LLVM -- Software Protection for the Masses, 2015 IEEE/ACM 1st International Workshop on Software Protection, pp.3-9, 2015. ,
DOI : 10.1109/SPRO.2015.10
Internet-scale Real-time Code Clone Search Via Multi-level Indexing, 2011 18th Working Conference on Reverse Engineering, pp.23-27, 2011. ,
DOI : 10.1109/WCRE.2011.13
Rendezvous: A search engine for binary code, 2013 10th Working Conference on Mining Software Repositories (MSR), pp.329-338, 2013. ,
DOI : 10.1109/MSR.2013.6624046
URL : http://www.cl.cam.ac.uk/~wmk26/rendezvous/msr13.pdf
Malware classification based on call graph clustering, Journal in Computer Virology, vol.2, issue.1, pp.233-245, 2011. ,
DOI : 10.1109/TCBB.2007.358301
URL : http://arxiv.org/pdf/1008.4365.pdf
Fast location of similar code fragments using semantic 'juice', Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop on, PPREW '13, pp.1-5, 2013. ,
DOI : 10.1145/2430553.2430558
Citadel Trojan Malware Analysis, Dell SecureWorks Counter Threat Unit Intelligence Services, 2012. ,
Expose: Discovering Potential Binary Code Re-use, 2013 IEEE 37th Annual Computer Software and Applications Conference, pp.492-501, 2013. ,
DOI : 10.1109/COMPSAC.2013.83
On the Reverse Engineering of the Citadel Botnet, Foundations and Practice of Security (LNCS), pp.408-425, 2014. ,
DOI : 10.1007/978-3-319-05302-8_25
Mining of Massive Datasets, 2014. ,
DOI : 10.1017/CBO9781139058452
An intelligent PE-malware detection system based on association mining, Journal in Computer Virology, vol.51, issue.8, pp.323-334, 2008. ,
DOI : 10.1007/s11416-008-0082-4
URL : http://users.cis.fiu.edu/%7Etaoli/pub/imds-journal-jv2008.pdf