Page 142 - 《软件学报》2024年第6期
P. 142

2718                                                       软件学报  2024  年第  35  卷第  6  期


                 [106]  Wang WW, Wu JC, Gong XL, Li T, Yew PC. Improving dynamically-generated code performance on dynamic binary translators. ACM
                      SIGPLAN Notices, 2018, 53(3): 17–30. [doi: 10.1145/3296975.3186413]
                 [107]  Cifuentes C, Van Emmerik M. Recovery of jump table case statements from binary code. In: Proc. of the 7th Int’l Workshop on Program
                      Comprehension. Pittsburgh: IEEE, 1999. 192–199. [doi: 10.1109/WPC.1999.777758]
                 [108]  Chen  JY,  Yang  W,  Hsu  WC,  Shen  BY,  Ou  QH.  On  static  binary  translation  of  ARM/thumb  mixed  ISA  binaries.  ACM  Trans.  on
                      Embedded Computing Systems, 2017, 16(3): 81. [doi: 10.1145/2996458]
                 [109]  Badaroux M, Pétrot F. Arbitrary and variable precision floating-point arithmetic support in dynamic binary translation. In: Proc. of the
                      26th Asia and South Pacific Design Automation Conf. Tokyo: Association for Computing Machinery, 2021. 325–330. [doi: 10.1145/
                      3394885.3431416]
                 [110]  Zhi YS, Zhang YY, Li JR, Gu DW. Security testing of software on embedded devices using x86 platform. In: Proc. of the 12th Int’l
                      Conf. on Collaborate Computing: Networking, Applications and Worksharing. Beijing: Springer, 2017. 497–504. [doi: 10.1007/978-3-
                      319-59288-6_47]
                 [111]  Wu J, Dong J, Fang RL, Zhang W, Wang WW, Zuo DC. FADATest: Fast and adaptive performance regression testing of dynamic
                      binary translation systems. In: Proc. of the 44th Int’l Conf. on Software Engineering. Pittsburgh: Association for Computing Machinery,
                      2022. 896–908. [doi: 10.1145/3510003.3510169]
                      Association, 1998. 5. [doi: 10.5555/1267549.1267554]
                 [112]  Guo H, Wang ZJ, Wu CG, He RN. EATBit: Effective automated test for binary translation with high code coverage. In: Proc. of the
                      2014 Design, Automation & Test in Europe Conf. & Exhibition (DATE). Dresden: IEEE, 2014. 1–6. [doi: 10.7873/DATE.2014.097]
                 [113]  Wu J, Dong J, Fang RL, Wang WW, Zuo DC. PerfDBT: Efficient performance regression testing of dynamic binary translation. In:
                      Proc.  of  the  38th  IEEE  Int’l  Conf.  on  Computer  Design  (ICCD).  Hartford:  IEEE,  2020.  389–392.  [doi:  10.1109/ICCD50377.2020.
                      00071]
                 [114]  Wagstaff H, Bodin B, Spink T, Franke B. SimBench: A portable benchmarking methodology for full-system simulators. In: Proc. of the
                      2017 IEEE Int’l Symp. on Performance Analysis of Systems and Software (ISPASS). Santa Rosa: IEEE, 2017. 217–226. [doi: 10.1109/
                      ISPASS.2017.7975293]
                 [115]  Kim S, Faerevaag M, Jung M, Jung S, Oh D, Lee J, Cha SK. Testing intermediate representations for binary analysis. In: Proc. of the
                      32nd  IEEE/ACM  Int’l  Conf.  on  Automated  Software  Engineering  (ASE).  Urbana:  IEEE,  2017.  353–364.  [doi:  10.1109/ASE.2017.
                      8115648]
                 [116]  Chen JY, Yang W, Shen BY, Li YJ, Hsu WC. Automatic validation for binary translation. Computer Languages, Systems & Structures,
                      2015, 43: 96–115. [doi: 10.1016/j.cl.2015.05.002]
                 [117]  Koltunov DS, Yu Efimov V, Padaryan VA. Automated testing of a TCG frontend for qemu. Programming and Computer Software,
                      2020, 46(8): 737–746. [doi: 10.1134/S0361768820080058]
                 [118]  Dasgupta S, Dinesh S, Venkatesh D, Adve VS, Fletcher CW. Scalable validation of binary lifters. In: Proc. of the 41st ACM SIGPLAN
                      Conf. on Programming Language Design and Implementation. London: Association for Computing Machinery, 2020. 655–671. [doi:
                      10.1145/3385412.3385964]
                 [119]  Fu LG, Pang JM, Wang J, Zhang JH, Yue F. Formal model of correctness and optimization on binary translation. Journal of Computer
                      Research and Development, 2019, 56(9): 2001–2011 (in Chinese with English abstract). [doi: 10.7544/issn1000-1239.2019.20180513]
                 [120]  Chen YY, Wu YF, Hu SL, Lee RB. Impact of dynamic binary translators on security. In: Proc. of the 1st Workshop on Architectural and
                      Microarchitectural Support for Binary Translation, Int’l Symp. on Computer Architecture (ISCA). 2008.
                 [121]  Vendicator. StackShield: A “stack smashing” technique protection tool for Linux. 2000. https://www.angelfire.com/sk/stackshield/
                 [122]  Cowan C, Pu C, Maier D, Hintony H, Walpole J, Bakke P, Beattie S, Grie A, Wagle P, Zhang Q. StackGuard: Automatic adaptive
                      detection and prevention of buffer-overflow attacks. In: Proc. of the 7th Conf. on USENIX Security Symp. San Antonio: USENIX

                 [123]  Baratloo  A,  Singh  N,  Tsai  T.  Transparent  run-time  defense  against  stack  smashing  attacks.  In:  Proc.  of  the  2000  Annual  Conf.  on
                      USENIX Annual Technical Conf. San Diego: USENIX Association, 2000. 21. [doi: 10.5555/1267724.1267745]
                 [124]  Kil C, Jun J, Bookholt C, Xu J, Ning P. Address space layout permutation (ASLP): Towards fine-grained randomization of commodity
                      software. In: Proc. of the 22nd Annual Computer Security Applications Conf. (ACSAC 2006). Miami Beach: IEEE, 2006. 339–348.
                      [doi: 10.1109/ACSAC.2006.9]
                 [125]  Horne B, Matheson L, Sheehan C, Tarjan RE. Dynamic self-checking techniques for improved tamper resistance. In: Proc. of the 2001
                      ACM Workshop on Digital Rights Management. Philadelphia: Springer, 2001. 141–159. [doi: 10.1007/3-540-47870-1_9]
                 [126]  El-Khalil  R,  Keromytis  AD.  Hydan:  Hiding  information  in  program  binaries.  In:  Proc.  of  the  6th  Int’l  Conf.  on  Information  and
                      Communications Security. Malaga: Springer, 2004. 187–199. [doi: 10.1007/978-3-540-30191-2_15]
   137   138   139   140   141   142   143   144   145   146   147