ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis
Information and Communications Security - Lecture Notes in Computer Science
◽
10.1007/978-3-642-17650-0_26
◽
2010
◽
pp. 367-382
◽
Cited By ~ 5
Author(s):
Kai Chen
◽
Yifeng Lian
◽
Yingjun Zhang
Keyword(s):
Taint Analysis
◽
Binary Programs
Download Full-text
Related Documents
Cited By
References
Dytaint: The implementation of a novel lightweight 3-state dynamic taint analysis framework for x86 binary programs
Computers & Security
◽
10.1016/j.cose.2015.03.008
◽
2015
◽
Vol 52
◽
pp. 51-69
◽
Cited By ~ 2
Author(s):
Erzhou Zhu
◽
Feng Liu
◽
Zuo Wang
◽
Alei Liang
◽
Yiwen Zhang
◽
...
Keyword(s):
Analysis Framework
◽
Taint Analysis
◽
State Dynamic
◽
Binary Programs
Download Full-text
Constructing a Hybrid Taint Analysis Framework for Diagnosing Attacks on Binary Programs
Journal of Computers
◽
10.4304/jcp.9.3.566-575
◽
2014
◽
Vol 9
(3)
◽
Cited By ~ 3
Author(s):
Erzhou Zhu
◽
Xuejun Li
◽
Feng Liu
◽
Xuejian Li
◽
Zhujuan Ma
Keyword(s):
Analysis Framework
◽
Taint Analysis
◽
Binary Programs
Download Full-text
Compositional Taint Analysis of Native Codes for Security Vetting of Android Applications
2020 10th International Conference on Computer and Knowledge Engineering (ICCKE)
◽
10.1109/iccke50421.2020.9303643
◽
2020
◽
Author(s):
Seyed Behnam Andarzian
◽
Behrouz Tork Ladani
Keyword(s):
Taint Analysis
◽
Android Applications
Download Full-text
Concise RLT forms of binary programs: A computational study of the quadratic knapsack problem
Naval Research Logistics (NRL)
◽
10.1002/nav.20364
◽
2009
◽
Vol 57
(1)
◽
pp. 1-12
◽
Cited By ~ 3
Author(s):
Richard J. Forrester
◽
Warren P. Adams
◽
Paul T. Hadavas
Keyword(s):
Knapsack Problem
◽
Computational Study
◽
Quadratic Knapsack Problem
◽
Quadratic Knapsack
◽
Binary Programs
Download Full-text
Disjunctive Decomposition for Two-Stage Stochastic Mixed-Binary Programs with Random Recourse
Operations Research
◽
10.1287/opre.1090.0693
◽
2010
◽
Vol 58
(1)
◽
pp. 229-243
◽
Cited By ~ 27
Author(s):
Lewis Ntaimo
Keyword(s):
Two Stage
◽
Binary Programs
Download Full-text
On the Deployment of Dynamic Taint Analysis for Application Communities
IEICE Transactions on Information and Systems
◽
10.1587/transinf.e92.d.548
◽
2009
◽
Vol E92-D
(3)
◽
pp. 548-551
◽
Cited By ~ 3
Author(s):
Hyung Chan KIM
◽
Angelos KEROMYTIS
Keyword(s):
Taint Analysis
Download Full-text
SHFuzz: A hybrid fuzzing method assisted by static analysis for binary programs
China Communications
◽
10.23919/jcc.2021.08.001
◽
2021
◽
Vol 18
(8)
◽
pp. 1-16
Author(s):
Wenjie Wang
◽
Donghai Tian
◽
Rui Ma
◽
Hang Wei
◽
Qianjin Ying
◽
...
Keyword(s):
Static Analysis
◽
Binary Programs
Download Full-text
NLEU: A Semantic-based Taint Analysis for Vetting Apps in Android
10.1109/nana53684.2021.00063
◽
2021
◽
Author(s):
Yuanqing Liu
◽
Ning Xi
◽
Yongbo Zhi
Keyword(s):
Taint Analysis
Download Full-text
Application of Taint Analysis to Study the Safety of Software of the Internet of Things Devices Based on the ARM Architecture
Automatic Control and Computer Sciences
◽
10.3103/s0146411620080246
◽
2020
◽
Vol 54
(8)
◽
pp. 834-840
Author(s):
T. D. Ovasapyan
◽
P. V. Knyazev
◽
D. A. Moskvin
Keyword(s):
Internet Of Things
◽
The Internet
◽
Taint Analysis
◽
The Internet Of Things
Download Full-text
Design and implementation of a dependence-based taint analysis
2016 11th International Conference on Computer Science & Education (ICCSE)
◽
10.1109/iccse.2016.7581718
◽
2016
◽
Cited By ~ 1
Author(s):
Guo Fan
◽
Zhou Xuan
Keyword(s):
Taint Analysis
◽
Design And Implementation
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close