Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection

作者: Lannan Luo , Jiang Ming , Dinghao Wu , Peng Liu , Sencun Zhu

DOI: 10.1145/2635868.2635900

关键词:

摘要: Existing code similarity comparison methods, whether source or binary code based, are mostly … In this paper, we propose a binary-oriented, obfuscation-resilient method based on a new …

参考文章(36)
Akito Monden, Haruaki Tamada, Masahide Nakamura, Ken-ichi Matsumoto, Keiji Okamoto, Dynamic Software Birthmarks to Detect the Theft of Windows Applications International Symposium on Future Software Technology 2004 (ISFST 2004). ,(2004)
David A. Molnar, Michael Y. Levin, Patrice Godefroid, Automated Whitebox Fuzz Testing. network and distributed system security symposium. ,(2008)
Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, Li Xie, Replacement attacks on behavior based software birthmark international conference on information security. pp. 1- 16 ,(2011) , 10.1007/978-3-642-24861-0_1
Jiang Ming, Meng Pan, Debin Gao, iBinHunt: binary hunting with inter-procedural control flow international conference on information security and cryptology. ,vol. 7839, pp. 92- 109 ,(2012) , 10.1007/978-3-642-37682-5_8
Jeffrey C. Lagarias, The Ultimate Challenge: The 3x+1 Problem ,(2011)
Thomas H. Cormen, Ronald L. Rivest, Charles E. Leiserson, Clifford Stein, Introduction to Algorithms, third edition ,(2009)
Shuvendu K. Lahiri, Chris Hawblitzel, Ming Kawaguchi, Henrique Rebêlo, SYMDIFF: A Language-Agnostic Semantic Diff Tool for Imperative Programs Computer Aided Verification. pp. 712- 717 ,(2012) , 10.1007/978-3-642-31424-7_54
Christian Collberg, Douglas Low, C. Thomborson, A Taxonomy of Obfuscating Transformations Department of Computer Science, The University of Auckland, New Zealand. ,(1997)
Halvar Flake, Structural Comparison of Executable Objects DIMVA. pp. 161- 173 ,(2004) , 10.17877/DE290R-2007
Debin Gao, Michael K. Reiter, Dawn Song, BinHunt: Automatically Finding Semantic Differences in Binary Programs international conference on information and communication security. pp. 238- 255 ,(2008) , 10.1007/978-3-540-88625-9_16