[1] JUNOD P, RINALDINI J, WEHRLI J, et al. Obfuscator-LLVM - software protection for the masses[C]//Proceeding of the 2015 IEEE/ACM 1st International Workshop on Software Protection. Piscataway, NJ:IEEE, 2015:3-9. [2] 赵楷.基于控制流平展化代码变形技术的研究[D].哈尔滨:哈尔滨工业大学,2009:16-18.(ZHAO K. Code obfuscation based on control flow flattening technique[D]. Harbin:Harbin Institute of Technology, 2009:16-18.) [3] DESCLAUX F. Miasm:framework de reverse engineering[EB/OL].[2017-10-20]. https://www.sstic.org/media/SSTIC2012/SSTIC-actes/miasm_framework_de_reverse_engineering/SSTIC2012-Article-miasm_framework_de_reverse_engineering-desclaux_1.pdf. [4] DUBOSCQ G, WVRTHINGER T, STADLER L, et al. An intermediate representation for speculative optimizations in a dynamic compiler[C]//Proceedings of the 7th ACM Workshop on Virtual Machines and Intermediate Languages. New York:ACM, 2013:1-10. [5] DULLIEN T, PORST S. REIL:a platform-independent intermediate representation of disassembled code for static code analysis[EB/OL]. http://moflow.org/ref/REIL%20-%20A%20platform-independent%20intermediate%20representation%20of%20disassembled%20code%20for%20static%20code%20analysis.pdf. [6] SHOSHITAISHVILI Y, WANG R Y, SALLS C, et al. SOK:(state of) the art of war:offensive techniques in binary analysis[C]//Proceedings of the 2016 IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE, 2016:138-157. [7] HEITMAN C, ARCE I. BARF:a multiplatform open source binary analysis and reverse engineering framework[EB/OL].[2017-10-20]. http://sedici.unlp.edu.ar/bitstream/handle/10915/42157/Documento_completo.pdf?sequence=1. [8] LÁSZLÓ T, KISS Á. Obfuscating C++ programs via control flow flattening[EB/OL].[2017-10-20]. https://www.inf.u-szeged.hu/~akiss/pub/pdf/laszlo_obfuscating.pdf. [9] WANG C X. A security architecture for survivability mechanisms[D]. Charlottesville, VA:University of Virginia, 2000:5-10. [10] 陈厅.动态程序分析技术在软件安全领域的研究[D].成都:电子科技大学,2013:6-15.(CHEN T. Research on dynamic program analysis technique for software security[D]. Chengdu:University of Electronic Science and Technology of China, 2013:6-15.) [11] 黄晖,陆余良,夏阳.基于动态符号执行的二进制程序缺陷发现系统[J].计算机应用研究,2013,30(9):2810-2812.(HUANG H, LU Y L, XIA Y. Dynamic symbolic execution based defect detection system for binary programs[J]. Application Research of Computers, 2013, 30(9):2810-2812.) [12] HASTIE T, TIBSHIRANI R, BOTSTEIN D, et al. Supervised harvesting of expression trees[J]. Genome Biology, 2001, 2(1):1-12. [13] BRUSCHI D, MARTIGNONI L, MONGA M. Detecting self-mutating malware using control-flow graph matching[C]//Proceedings of the 2006 International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, LNCS 4064. Berlin:Springer, 2006:129-143. [14] 任胜兵,吴斌,张健威,等.基于可满足性模理论求解器的程序路径验证方法[J].计算机应用,2016,36(10):2806-2810.(REN S B, WU B, ZHANG J W, et al. Method of program path validation based on satisfiability modulo theory solver[J]. Journal of Computer Applications, 2016, 36(10):2806-2810.) [15] SEBASTIANI R. Lazy satisfiability modulo theories[J]. Journal on Satisfiability Boolean Modeling & Computation, 2007, 3(3):141-224. [16] Rhelmot. Intermediate representation[EB/OL].[2017-07-14]. https://github.com/angr/angr-doc/blob/master/docs/ir.md. [17] EGELE M, WOO M, CHAPMAN P, et al. Blanket execution:dynamic similarity testing for program binaries and components[C]//Proceedings of the 23rd USENIX Conference on Security Symposium. New York:ACM, 2014:303-317. [18] CHOW S, GU Y, JOHNSON H, et al. An approach to the obfuscation of control-flow of sequential computer programs[C]//Proceedings of the 20014th International Conference on Information Security, LNCS 2200. Berlin:Springer, 2001:144-155. |