함수 수준 특징정보 기반의 오픈소스 소프트웨어 모듈 탐지

논문상세정보
' 함수 수준 특징정보 기반의 오픈소스 소프트웨어 모듈 탐지' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • binaryprogram
  • controlflowgraph
  • function-levelfeatures
  • module detection
  • open-source software
  • 모듈 탐지
  • 바이너리 프로그램
  • 오픈 소스 소프트웨어
  • 제어흐름 그래프
  • 함수수준 특징정보
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
76 0

0.0%

' 함수 수준 특징정보 기반의 오픈소스 소프트웨어 모듈 탐지' 의 참고문헌

  • 프로그램의 구조와 상수 값을 이용하는 바이너리 실행 파일의 차이점 분석
    박희완 정보과학회논문지 : 소프트웨어 및 응용 35 (7) : 452 ~ 461 [2008]
  • 바이너리 코드 수준에서 연산자 k-gram 기반의 오픈소스 소프트웨어 탐지
    조성제 정보과학회논문지 : 시스템 및 이론 41 (1) : 23 ~ 32 [2014]
  • k-gram based software birthmarks
    Collberg, C. Myles, G. Proc. of the 2005 ACM Symposium on Applied Computing (SAC) : 314 ~ 318 [2005]
  • Windows 프로그램 도용 탐지를 위한 기능 단위 동적 API 버스마크
    최석우 정보과학회논문지 : 소프트웨어 및 응용 36 (9) : 767 ~ 776 [2009]
  • Webinar: Open source component governance and management using cobit 5
    P. Marshall Information Systems Audit and Control Association (ISACA)
  • 박사
  • Protex
  • Predicts 2011: Open-Source Software, the Power Behind the Throne
    Gartner [2010]
  • Polymorphic Worm Detection using Structural Information of Executables
    Kirda, E. Kruegel, C. Mutz, D. Robertson, W. Vigna, G. Proc. of the 8th international conference on Recent Advances in Intrusion Detection(RAID ’05) : 207 ~ 226 [2006]
  • Open source software detection using function-level static software birthmark
    D. Kim Journal of Internet Services and Information Security (JISIS) 4 (4) : 25 ~ 37 [2014]
  • Malware Variant Detection using Similarity Search over Sets of Control Flow Graphs
    S. Cesare Proc. of 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) : 181 ~ 189 [2011]
  • Malware Classification based on Call Graph Clustering
    J. Kinable Journal in Computer Virology 7 (4) : 233 ~ 245 [2011]
  • Large-scale Malware Indexing using Function-call Graphs
    X. Hu Proc. of the 16th ACM conference on Computer and communications security (CCS ’09) : 611 ~ 620 [2009]
  • Graph-based Malware Detection using Dynamic Analysis
    B. Anderson Journal of Computer Virology 7 (4) : 247 ~ 258 [2011]
  • Free Software Foundation Files Suit Against Cisco For GPL Violations
    M. Lee Free Software Foundation [2008]
  • Fossology
  • Dynamic software birthmarks to detect the theft of windows applications
    H. Tamada Proc. of the International Symposium on Future Software Technology 2004 (ISFST 2004) [2004]
  • Detecting software theft with API call sequence Sets
    D. Schuler Proc. of the 8th Workshop Software Reengineering [2006]
  • Detecting Self-mutating Malware using Control-Flow Graph Matching
    Bruschi, D. Martignoni, L. Monga, M. Proc. of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment(DIMVA’06) : 129 ~ 143 [2006]
  • BusyBox Developers Agree To End GPL Lawsuit Against Verizon
    J. Garrison Software Freedom Law Center [2008]
  • Binary Analysis Tool (BAT)
  • An Automated Virus Classification System
    M. Gheorghescu Virus Bulletin Conference : 294 ~ 300 [2005]
  • A combined static and dynamic software birthmark based on component dependence graph
    X. Zhou Proc. of the 4th Int'l Conf. on Intelligent Information Hiding and Multimedia Signal Processing(IIH-MSP) : 1416 ~ 1421 [2008]
  • A Virus Detection Scheme based on Features of Control Flow Graph
    Z. Zhao Proc. of 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC) : 943 ~ 947 [2011]
  • A Static Birthmark of Binary Executables Based on API Call Structure
    S. Choi Proc. of the 12th ASIAN 2007 : 2 ~ 16 [2007]
  • A Method to Evaluate CFG Comparison Algorithms
    P. P. F. Chan Proc. of 2014 14th International Conference on Quality Software : 95 ~ 104 [2014]
  • 50 Years of Integer Programming 1958-2008
    H. W. Kuhn 50 Years of Integer Programming 1958-2008, pp : 29 ~ 47 [2010]