Page 146 - 《软件学报》2024年第6期
P. 146
2722 软件学报 2024 年第 35 卷第 6 期
Conf. on Architectural Support for Programming Languages and Operating Systems. Newport Beach: Association for Computing
Machinery, 2011. 265–278. [doi: 10.1145/1950365.1950396]
[196] Yun I, Lee S, Xu M, Jang Y, Kim T. QSYM: A practical concolic execution engine tailored for hybrid fuzzing. In: Proc. of the 27th
USENIX Conf. on Security Symp. Baltimore: USENIX Association, 2018. 745–761.
[197] Poeplau S, Francillon A. Symbolic execution with SYMCC: Don’t interpret, compile! In: Proc. of the 29th USENIX Security Symp.
Electr Network: USENIX Association, 2020. 181–198.
[198] Rosenblum M. VMware virtual platform technology. In. Proc. of the 3rd Windows NT Symp. Seattle: USENIX Association, 1999.
[199] Kivity A, Kamay Y, Laor D, Lublin U, Liguori A. Kvm: The Linux virtual machine monitor. In: Proc. of the 2007 Linux Symp. 2007.
15.
[200] Shan Z, Guo HR, Pang JM. BTMD: A framework of binary translation based malcode detector. In: Proc. of the 2012 Int’l Conf. on
Cyber-enabled Distributed Computing and Knowledge Discovery. Sanya: IEEE, 2012. 39–43. [doi: 10.1109/CyberC.2012.16]
[201] Spreitzenbarth M, Schreck T, Echtler F, Arp D, Hoffmann J. Mobile-Sandbox: Combining static and dynamic analysis with machine-
learning techniques. Int’l Journal of Information Security, 2015, 14(2): 141–153. [doi: 10.1007/s10207-014-0250-0]
[202] Cao MC, Hou XT, Wang T, Qu H, Zhou YJ, Bai XL, Wang FW. Different is good: Detecting the use of uninitialized variables through
differential replay. In: Proc. of the 2019 ACM SIGSAC Conf. on Computer and Communications Security. London: Association for
Computing Machinery, 2019. 1883–1897. [doi: 10.1145/3319535.3345654]
[203] Garba P, Favaro M. SATURN—Software deobfuscation framework based on LLVM. In: Proc. of the 3rd ACM Workshop on Software
Protection. London: Association for Computing Machinery, 2019. 27–38. [doi: 10.1145/3338503.3357721]
[204] Kan ZL, Wang HY, Wu L, Guo Y, Xu GA. Deobfuscating Android native binary code. In: Proc. of the 41st IEEE/ACM Int’l Conf. on
Software Engineering: Companion Proc. Montreal: IEEE, 2019. 322–323. [doi: 10.1109/ICSE-Companion.2019.00135]
[205] Wang Y, Gu LZ, Li ZX, Yang YX. Protocol reverse engineering through dynamic and static binary analysis. The Journal of China
Universities of Posts and Telecommunications, 2013, 20(S2): 75–79. [doi: 10.1016/S1005-8885(13)60217-4]
[206] Wasson S. Nvidia claims Haswell-class performance for Denver CPU core. 2014. https://techreport.com/news/26906/nvidia-claims-
haswell-class-performance-for-denver-cpu-core/
[207] Brandalero M, Shafique M, Carro L, Beck ACS. TransRec: Improving adaptability in single-ISA heterogeneous systems with
transparent and reconfigurable acceleration. In: Proc. of the 2019 Design, Automation & Test in Europe Conf. & Exhibition (DATE).
Florence: IEEE, 2019. 582–585. [doi: 10.23919/DATE.2019.8715121]
[208] Hong DY, Lin SK, Fu SY, Wu JJ, Hsu WC. Enhancing transactional memory execution via dynamic binary translation. ACM SIGAPP
Applied Computing Review, 2019, 19(1): 48–58. [doi: 10.1145/3325061.3325065]
附中文参考文献:
[8] 李剑慧, 马湘宁, 朱传琪. 动态二进制翻译与优化技术研究. 计算机研究与发展, 2007, 44(1): 161–168. [doi: 10.1360/crad20070123]
[17] 胡伟武, 汪文祥, 吴瑞阳, 王焕东, 曾露, 徐成华, 高翔, 张福新. 龙芯指令系统架构技术. 计算机研究与发展, 2023, 60(1): 2–16. [doi:
10.7544/issn1000-1239.202220196]
[18] 李男, 庞建民. 基于中间表示规则替换的二进制翻译中间代码优化方法. 国防科技大学学报, 2021, 43(4): 156–162. [doi: 10.11887/
j.cn.202104019]
[24] 刘晓楠. 面向国产处理器的二进制翻译关键技术研究 [博士学位论文]. 郑州: 解放军信息工程大学, 2014.
[42] 马湘宁. 二进制翻译关键技术研究 [博士学位论文]. 北京: 中国科学院大学 (中国科学院计算技术研究所), 2004.
[91] 胡伟武, 靳国杰, 汪文祥, 张晓春, 王焕东. 龙芯指令系统融合技术. 中国科学: 信息科学, 2015, 45(4): 459–479. [doi: 10.1360/
N112014-00300]
[119] 傅立国, 庞建民, 王军, 张家豪, 岳峰. 二进制翻译正确性及优化方法的形式化模型. 计算机研究与发展, 2019, 56(9): 2001–2011.
[doi: 10.7544/issn1000-1239.2019.20180513]
[143] 文延华, 唐大国, 漆锋滨. 二进制翻译中的寄存器映射与剪裁的实现. 软件学报, 2009, 20: 1–7. http://www.jos.org.cn/1000-9825/
09001.htm
[157] 王军, 庞建民, 傅立国, 岳峰, 张家豪. 一种高效解决间接转移的反馈式静态二进制翻译方法. 计算机研究与发展, 2019, 56(4):
742–754. [doi: 10.7544/issn1000-1239.2019.20170412]
[162] 王军, 庞建民, 傅立国, 岳峰, 单征, 张家豪. 二进制翻译中动静结合的寄存器分配优化方法. 计算机研究与发展, 2019, 56(4):
708–718. [doi: 10.7544/issn1000-1239.2019.20170905]
[173] 王文文, 武成岗, 白童心, 王振江, 远翔, 崔慧敏. 二进制翻译中标志位的模式化翻译方法. 计算机研究与发展, 2014, 51(10): 2336–2347.