-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathdis.bib
433 lines (389 loc) · 13.8 KB
/
dis.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
@string{apl = {Appl. Phys. Lett.}}
@string{arpc = {Annu. Rev. Phys. Chem.}}
@string{assp = {Adv. Solid State Phys.}}
@string{cise = {Computing in Science and Eng.}}
@string{cpl = {Chem. Phys. Lett.}}
@string{epl = {Europhys. Lett.}}
@string{ijqc = {Int. J. Quant. Chem.}}
@string{jap = {J. Appl. Phys.}}
@string{jce = {J. Comput. Electron.}}
@string{jcg = {J. Cryst. Growth}}
@string{jcp = {J. Chem. Phys.}}
@string{jem = {J. Elec. Mat.}}
@string{jltp = {J. of Low Temp. Phys.}}
@string{jp = {J. Physique}}
@string{jpc = {J. Phys. Chem.}}
@string{jpcb = {J. Phys. Chem. B}}
@string{jpcm = {J. Phys.: Condens. Matter}}
@string{jsp = {J. Stat. Phys.}}
@string{mrs = {MRS Bull.}}
@string{nature = {Nature}}
@string{npa = {Nuc. Phys. A}}
@string{pe = {Physica E}}
@string{pla = {Phys. Lett. A}}
@string{plb = {Phys. Lett. B}}
@string{pnas = {Proc. Nat. Acad. Sci.}}
@string{pr = {Phys. Rev}}
@string{pra = {Phys. Rev. A}}
@string{prb = {Phys. Rev. B}}
@string{prc = {Phys. Rev. C}}
@string{prd = {Phys. Rev. D}}
@string{pre = {Phys. Rev. E}}
@string{prl = {Phys. Rev. Lett.}}
@string{pssa = {Phys. Stat. Sol. (a)}}
@string{pssb = {Phys. Stat. Sol. (b)}}
@string{rmp = {Rev. Mod. Phys.}}
@string{science = {Science}}
@string{sm = {Superlattices and Microstructures}}
@string{ssc = {Solid State Comm.}}
@string{sst = {Semicond. Sci. Technol.}}
@inproceedings{cowan1998stackguard,
title={Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks.},
author={Cowan, Crispan and Pu, Calton and Maier, Dave and Walpole, Jonathan and Bakke, Peat and Beattie, Steve and Grier, Aaron and Wagle, Perry and Zhang, Qian and Hinton, Heather},
booktitle={USENIX security symposium},
volume={98},
pages={63--78},
year={1998},
organization={San Antonio, TX}
}
@inproceedings{pappas2013transparent,
title={Transparent $\{$ROP$\}$ exploit mitigation using indirect branch tracing},
author={Pappas, Vasilis and Polychronakis, Michalis and Keromytis, Angelos D},
booktitle={22nd USENIX Security Symposium (USENIX Security 13)},
pages={447--462},
year={2013}
}
@inproceedings{shoshitaishvili2016sok,
title={Sok:(state of) the art of war: Offensive techniques in binary analysis},
author={Shoshitaishvili, Yan and Wang, Ruoyu and Salls, Christopher and Stephens, Nick and Polino, Mario and Dutcher, Andrew and Grosen, John and Feng, Siji and Hauser, Christophe and Kruegel, Christopher and others},
booktitle={2016 IEEE Symposium on Security and Privacy (SP)},
pages={138--157},
year={2016},
organization={IEEE}
}
@article{cavusoglu2004effect,
title={The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers},
author={Cavusoglu, Huseyin and Mishra, Birendra and Raghunathan, Srinivasan},
journal={International Journal of Electronic Commerce},
volume={9},
number={1},
pages={70--104},
year={2004},
publisher={Taylor \& Francis}
}
@article{hailpern2002software,
title={Software debugging, testing, and verification},
author={Hailpern, Brent and Santhanam, Padmanabhan},
journal={IBM Systems Journal},
volume={41},
number={1},
pages={4--12},
year={2002},
publisher={IBM}
}
@article{redziejowski2007parsing,
title={Parsing expression grammar as a primitive recursive-descent parser with backtracking},
author={Redziejowski, Roman R},
journal={Fundamenta Informaticae},
volume={79},
number={3-4},
pages={513--524},
year={2007},
publisher={IOS Press}
}
@inproceedings{kanemitsu2011visualization,
title={A visualization method of program dependency graph for identifying extract method opportunity},
author={Kanemitsu, Tomoko and Higo, Yoshiki and Kusumoto, Shinji},
booktitle={Proceedings of the 4th Workshop on Refactoring Tools},
pages={8--14},
year={2011}
}
@inproceedings{heffernan2006data,
title={Data-dependency graph transformations for superblock scheduling},
author={Heffernan, Mark and Wilken, Kent and Shobaki, Ghassan},
booktitle={2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06)},
pages={77--88},
year={2006},
organization={IEEE}
}
@MISC{CVE-2021-3156,
key={CVE-2021-3156},
title = {{CVE}-2021-3156.},
howpublished = "Available from MITRE CVE database, {CVE-2021-3156}.",
month=jan # "15",
year = {2021},
url={https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3156 },
urldate={1 April 2021}
}
@misc{networkx,
title = {{NetworkX} DiGraph -- Directed graphs with self loops},
author={NetworkX},
year=2022,
howpublished = {\url{https://networkx.org/documentation/stable/reference/classes/digraph.html}},
note = {Accessed: 2022-04-01}
}
@misc{networkxdraw,
title = {{NetworkX} Drawing},
author= {NetworkX},
year=2022,
howpublished = {\url{https://networkx.org/documentation/stable/reference/drawing.html}},
note = {Accessed: 2022-04-01}
}
@article{blackler2016life,
title={Life is too short to RTFM: how users relate to documentation and excess features in consumer products},
author={Blackler, Alethea L and Gomez, Rafael and Popovic, Vesna and Thompson, M Helen},
journal={Interacting with Computers},
volume={28},
number={1},
pages={27--46},
year={2016},
publisher={Oxford University Press}
}
@inproceedings{clause2007dytan,
title={Dytan: a generic dynamic taint analysis framework},
author={Clause, James and Li, Wanchun and Orso, Alessandro},
booktitle={Proceedings of the 2007 international symposium on Software testing and analysis},
pages={196--206},
year={2007}
}
@inproceedings{wang2017semdiff,
title={Semdiff: Finding semtic differences in binary programs based on angr},
author={Wang, Shi-Chao and Liu, Chu-Lei and Li, Yao and Xu, Wei-Yang},
booktitle={ITM Web of Conferences},
volume={12},
pages={03029},
year={2017},
organization={EDP Sciences}
}
@INPROCEEDINGS{8077799,
author={Wang, Fish and Shoshitaishvili, Yan},
booktitle={2017 IEEE Cybersecurity Development (SecDev)},
title={Angr - The Next Generation of Binary Analysis},
year={2017},
volume={},
number={},
pages={8-9},
doi={10.1109/SecDev.2017.14}}
@inproceedings{stephens2016driller,
title={Driller: Augmenting Fuzzing Through Selective Symbolic Execution.},
author={Stephens, Nick and Grosen, John and Salls, Christopher and Dutcher, Audrey and Wang, Ruoyu and Corbetta, Jacopo and Shoshitaishvili, Yan and Kruegel, Christopher and Vigna, Giovanni},
booktitle={NDSS},
volume={16},
pages={1--16},
year={2016}
}
@article{wang2017ramblr,
title={Ramblr: Making Reassembly Great Again},
author={Wang, Ruoyu and Shoshitaishvili, Yan and Bianchi, Antonio and Machiry, Aravind and Grosen, John and Grosen, Paul and Kruegel, Christopher and Vigna, Giovanni},
booktitle={NDSS},
year={2017}
}
@article{redini2017bootstomp,
title={{BootStomp}: On the Security of Bootloaders in Mobile Devices},
author={Redini, Nilo and Machiry, Aravind and Das, Dipanjan and Fratantonio, Yanick and Bianchi, Antonio and Gustafson, Eric and Shoshitaishvili, Yan and Kruegel, Christopher and Vigna, Giovanni},
booktitle={USENIX Security Symposium},
year={2017}
}
@mastersthesis{parvez2016combining,
title={Combining static analysis and targeted symbolic execution for scalable bug-finding in application binaries},
author={Parvez, Muhammad Riyad},
year={2016},
school={University of Waterloo}
}
@inproceedings{taylor2016tool,
title={A Tool for Teaching Reverse Engineering.},
author={Taylor, Clark and Colberg, Christian},
booktitle={ASE@ USENIX Security Symposium},
year={2016}
}
@incollection{zheng2016lightweight,
title={A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems},
author={Zheng, Yaowen and Cheng, Kai and Li, Zhi and Pan, Shiran and Zhu, Hongsong and Sun, Limin},
booktitle={Information and Communications Security},
pages={27--36},
year={2016},
publisher={Springer}
}
@inproceedings{buhov2016catch,
title={Catch Me if You Can! {T}ransparent Detection of Shellcode},
author={Buhov, Damjan and Thron, Richard and Schrittwieser, Sebastian},
booktitle={Software Security and Assurance (ICSSA), 2016 International Conference on},
pages={60--63},
year={2016},
organization={IEEE}
}
@article{flackgraph,
title={Graph Convolutional Network for Classifying Binaries with Control Flow Graph Data},
author={Flack, Micah and Foster, Rita and Xu, Shengjie}
}
@article{hernandez2017firmusb,
title={FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution},
author={Hernandez, Grant and Fowze, Farhaan and Yavuz, Tuba and Butler, Kevin RB and others},
journal={ACM Conference on Computer and Communications Security},
year={2017}
}
@article{honig2017autonomous,
title={Autonomous Exploitation of System Binaries using Symbolic Analysis},
author={Honig, Joran},
booktitle={Proceedings of the 27th Twente Student Conference on IT},
year={2017}
}
@misc{binja,
title = {Binary Ninja},
publisher={Vector35},
year=2022,
howpublished = {\url{https://binary.ninja/}},
note = {Accessed: 2022-04-18}
}
@misc{vexir,
title = {Intermediate Representation},
publisher={angr},
year=2022,
howpublished = {\url{https://docs.angr.io/advanced-topics/ir}},
note = {Accessed: 2022-04-18}
}
@misc{ghidra,
title = {Ghidra},
publisher={National Security Agency},
year=2022,
howpublished = {\url{https://ghidra-sre.org/}},
note = {Accessed: 2022-04-18}
}
@misc{ida,
title = {IDA Pro},
publisher={Hex Rays},
year=2022,
howpublished = {\url{https://hex-rays.com/ida-pro/}},
note = {Accessed: 2022-04-18}
}
@misc{serpilliere_2017,
title={Data flow analysis: DepGraph},
howpublished={\url{https://miasm.re/blog/2017/02/03/data_flow_analysis_depgraph.html}},
journal={Data Flow Analysis: DepGraph - MIASM's blog}, author={Serpilliere},
year={2017},
month={Feb}
}
@article{baldoni2018survey,
title={A survey of symbolic execution techniques},
author={Baldoni, Roberto and Coppa, Emilio and D’elia, Daniele Cono and Demetrescu, Camil and Finocchi, Irene},
journal={ACM Computing Surveys (CSUR)},
volume={51},
number={3},
pages={1--39},
year={2018},
publisher={ACM New York, NY, USA}
}
@article{king1976symbolic,
title={Symbolic execution and program testing},
author={King, James C},
journal={Communications of the ACM},
volume={19},
number={7},
pages={385--394},
year={1976},
publisher={ACM New York, NY, USA}
}
@book{grune2012modern,
title={Modern compiler design},
author={Grune, Dick and Van Reeuwijk, Kees and Bal, Henri E and Jacobs, Ceriel JH and Langendoen, Koen},
year={2012},
publisher={Springer Science \& Business Media}
}
@book{muchnick1997advanced,
title={Advanced compiler design implementation},
author={Muchnick, Steven and others},
year={1997},
publisher={Morgan kaufmann}
}
@book{aho2003compilers,
title={Compilers: principles, techniques and tools (for Anna University), 2/e},
author={Aho, Alfred V},
year={2003},
publisher={Pearson Education India}
}
@article{ferrante1987program,
title={The program dependence graph and its use in optimization},
author={Ferrante, Jeanne and Ottenstein, Karl J and Warren, Joe D},
journal={ACM Transactions on Programming Languages and Systems (TOPLAS)},
volume={9},
number={3},
pages={319--349},
year={1987},
publisher={ACM New York, NY, USA}
}
@misc{framac,
title = {Slicing},
publisher={Frama C},
year=2022,
howpublished = {\url{https://www.frama-c.com/fc-plugins/slicing.html}},
note = {Accessed: 2022-04-18}
}
@inproceedings{kuck1981dependence,
title={Dependence graphs and compiler optimizations},
author={Kuck, David J and Kuhn, Robert H and Padua, David A and Leasure, Bruce and Wolfe, Michael},
booktitle={Proceedings of the 8th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages},
pages={207--218},
year={1981}
}
@misc{llvm,
title = {Dependence Graphs in LLVM},
publisher={LLVM Compiler Infrastructure},
year=2022,
howpublished = {\url{https://llvm.org/docs/DependenceGraphs/index.html}},
note = {Accessed: 2022-04-18}
}
@inproceedings{higo2009enhancing,
title={Enhancing quality of code clone detection with program dependency graph},
author={Higo, Yoshiki and Kusumoto, Shinji},
booktitle={2009 16th Working Conference on Reverse Engineering},
pages={315--316},
year={2009},
organization={IEEE}
}
@article{zhang2019bda,
title={BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation},
author={Zhang, Zhuo and You, Wei and Tao, Guanhong and Wei, Guannan and Kwon, Yonghwi and Zhang, Xiangyu},
journal={Proceedings of the ACM on Programming Languages},
volume={3},
number={OOPSLA},
pages={1--31},
year={2019},
publisher={ACM New York, NY, USA}
}
@phdthesis{gallagher1990using,
title={Using program slicing in software maintenance},
author={Gallagher, Keith Brian},
year={1990},
school={University of Maryland, Baltimore County}
}
@inproceedings{newsome2005dynamic,
title={Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.},
author={Newsome, James and Song, Dawn Xiaodong},
booktitle={NDSS},
volume={5},
pages={3--4},
year={2005},
organization={Citeseer}
}
@article{zhu2015dytaint,
title={Dytaint: The implementation of a novel lightweight 3-state dynamic taint analysis framework for x86 binary programs},
author={Zhu, Erzhou and Liu, Feng and Wang, Zuo and Liang, Alei and Zhang, Yiwen and Li, Xuejian and Li, Xuejun},
journal={Computers \& Security},
volume={52},
pages={51--69},
year={2015},
publisher={Elsevier}
}
@misc{cohen1977statistical,
title={Statistical power analysis for the behavioral sciences (revised ed.)},
author={Cohen, Jacob},
year={1977},
publisher={New York: Academic Press}
}
@book{wolf1986meta,
title={Meta-analysis: Quantitative methods for research synthesis},
author={Wolf, Fredric M and others},
volume={59},
year={1986},
publisher={Sage}
}