[1]LU K. The vulnerabilities detection technology research and implementation based on dynamic taint analysis [D]. Chengdu: University of Electronic Science and Technology of China, 2013.(陆开奎. 基于动态污点分析的漏洞攻击检测技术研究与实现[D]. 成都:电子科技大学, 2013.)
[2]LIU Y, WANG M, SU P, et al. Communication protocol reverse engineering of malware using dynamic taint analysis [J]. Acta Electronica Sinica, 2012, 40(4): 661-668.(刘豫, 王明华, 苏璞睿, 等. 基于动态污点分析的恶意代码通信协议逆向分析方法[J]. 电子学报, 2012, 40(4): 661-668.)
[3]LIU X. A non control data attack defense model design and implementation based on the pointer taint analysis[D].Nanjing: Nanjing University, 2013.(刘小龙. 基于指针污点分析的非控制数据攻击防御模型的设计和实现[D]. 南京:南京大学, 2013.)
[4]WANG Z. Dynamic taint analysis of binary code based on symbolic execution[D]. Shanghai: Shanghai Jiao Tong University, 2010.(王卓. 基于符号执行的二进制代码动态污点分析[D]. 上海:上海交通大学, 2010.)
[5]WANG T. The vulnerability mining for binary program [D]. Beijing: Peking University, 2011.(王铁磊. 面向二进制程序的安全漏洞挖掘[D]. 北京:北京大学, 2011.)
[6]HUANG Z. An improved dynamic taint analysis model[D]. Wuhan: Huazhong University of Science and Technology, 2011.(黄昭. 一种改进的动态污点分析模型[D]. 武汉:华中科技大学, 2011.)
[7]PATIL H, PEREIRA C, STALLCUP M, et al. PinPlay: a framework for deterministic replay and reproducible analysis of parallel programs[C]// Proceedings of the 8th Annual IEEE/ACM International Symposium on Code Generation and Optimization. New York: ACM, 2010: 2-11.
[8]LUK C K. Pin: building customized program analysis tools with dynamic instrumentation [EB/OL]. [2014-06-12].http://www.cs.virginia.edu/papers/p190-luk.pdf.
[9]BRUENING D L. Efficient, transparent, and comprehensive runtime code manipulation [D]. Cambridge: MIT, 2004.
[10]NETHERCOTE N, SEWARD J. Valgrind: a framework for heavyweight dynamic binary instrumentation[EB/OL]. [2014-04-20].http://valgrind.org/docs/valgrind2007.pdf.
[11]SONG D, BRUMLEY D, YIN H, et al. BitBlaze: a new approach to computer security via binary analysis[M]. Berlin: Springer, 2008: 1-25.
[12]BRUMLEY D, JAGER I, AVGERINOS T, et al. BAP: a binary analysis platform[C]// Proceedings of the 23rd International Conference on Computer Aided Verification. Berlin: Springer, 2011: 463-469. |