作者: Junyuan Zeng , Yangchun Fu , Kenneth A. Miller , Zhiqiang Lin , Xiangyu Zhang
关键词: Software 、 Binary code 、 Programming language 、 Computer science 、 Malware 、 Obfuscation (software) 、 Malware analysis 、 Static analysis 、 Unreachable code 、 Source code 、 Redundant code 、 Dead code 、 Code bloat 、 Theoretical computer science 、 Static program analysis 、 Obfuscation
摘要: With the wide existence of binary code, it is desirable to reuse it in many security applications, such as malware analysis and software patching. While prior approaches have shown that …