Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Evaluation methodologies in software protection research
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …
software runs, and try to break the confidentiality or integrity of assets embedded in the …
Efficient malware detection using model-checking
Over the past decade, malware costs more than $10 billion every year and the cost is still
increasing. Classical signature-based and emulation-based methods are becoming …
increasing. Classical signature-based and emulation-based methods are becoming …
Pushdown model checking for malware detection
The number of malware is growing extraordinarily fast. Therefore, it is important to have
efficient malware detectors. Malware writers try to obfuscate their code by different …
efficient malware detectors. Malware writers try to obfuscate their code by different …
Monadic abstract interpreters
Recent developments in the systematic construction of abstract interpreters hinted at the
possibility of a broad unification of concepts in static analysis. We deliver that unification by …
possibility of a broad unification of concepts in static analysis. We deliver that unification by …
Integer Parameter Synthesis for Timed Automata.
We provide a subclass of parametric timed automata (PTA) that we can actually and
efficiently analyze, and we argue that it retains most of the practical usefulness of PTA. The …
efficiently analyze, and we argue that it retains most of the practical usefulness of PTA. The …
LTL model-checking for malware detection
Nowadays, malware has become a critical security threat. Traditional anti-viruses such as
signature-based techniques and code emulation become insufficient and easy to get …
signature-based techniques and code emulation become insufficient and easy to get …
RePEconstruct: reconstructing binaries with self-modifying code and import address table destruction
Reverse engineering packed binaries remain a tedious challenge as code packing is
continuously being used by malware to hinder detection and analysis. The problem of …
continuously being used by malware to hinder detection and analysis. The problem of …
[HTML][HTML] Unveiling metamorphism by abstract interpretation of code properties
Metamorphic code includes self-modifying semantics-preserving transformations to exploit
code diversification. The impact of metamorphism is growing in security and code protection …
code diversification. The impact of metamorphism is growing in security and code protection …
Widening for control-flow
We present a parameterized widening operator that determines the control-flow sensitivity of
an analysis, ie, its flow-sensitivity, context-sensitivity, and path-sensitivity. By instantiating the …
an analysis, ie, its flow-sensitivity, context-sensitivity, and path-sensitivity. By instantiating the …
The grand challenge in metamorphic analysis
Malware detection is a crucial aspect of software security. Malware typically recur to a variety
of disguise and concealing techniques in order to avoid detection. Metamorphism is the …
of disguise and concealing techniques in order to avoid detection. Metamorphism is the …