Page 146 - 《软件学报》2024年第6期
P. 146

2722                                                       软件学报  2024  年第  35  卷第  6  期


                      Conf.  on  Architectural  Support  for  Programming  Languages  and  Operating  Systems.  Newport  Beach:  Association  for  Computing
                      Machinery, 2011. 265–278. [doi: 10.1145/1950365.1950396]
                 [196]  Yun I, Lee S, Xu M, Jang Y, Kim T. QSYM: A practical concolic execution engine tailored for hybrid fuzzing. In: Proc. of the 27th
                      USENIX Conf. on Security Symp. Baltimore: USENIX Association, 2018. 745–761.
                 [197]  Poeplau S, Francillon A. Symbolic execution with SYMCC: Don’t interpret, compile! In: Proc. of the 29th USENIX Security Symp.
                      Electr Network: USENIX Association, 2020. 181–198.
                 [198]  Rosenblum M. VMware virtual platform technology. In. Proc. of the 3rd Windows NT Symp. Seattle: USENIX Association, 1999.
                 [199]  Kivity A, Kamay Y, Laor D, Lublin U, Liguori A. Kvm: The Linux virtual machine monitor. In: Proc. of the 2007 Linux Symp. 2007.
                      15.
                 [200]  Shan Z, Guo HR, Pang JM. BTMD: A framework of binary translation based malcode detector. In: Proc. of the 2012 Int’l Conf. on
                      Cyber-enabled Distributed Computing and Knowledge Discovery. Sanya: IEEE, 2012. 39–43. [doi: 10.1109/CyberC.2012.16]
                 [201]  Spreitzenbarth M, Schreck T, Echtler F, Arp D, Hoffmann J. Mobile-Sandbox: Combining static and dynamic analysis with machine-
                      learning techniques. Int’l Journal of Information Security, 2015, 14(2): 141–153. [doi: 10.1007/s10207-014-0250-0]
                 [202]  Cao MC, Hou XT, Wang T, Qu H, Zhou YJ, Bai XL, Wang FW. Different is good: Detecting the use of uninitialized variables through
                      differential replay. In: Proc. of the 2019 ACM SIGSAC Conf. on Computer and Communications Security. London: Association for

                      Computing Machinery, 2019. 1883–1897. [doi: 10.1145/3319535.3345654]
                 [203]  Garba P, Favaro M. SATURN—Software deobfuscation framework based on LLVM. In: Proc. of the 3rd ACM Workshop on Software
                      Protection. London: Association for Computing Machinery, 2019. 27–38. [doi: 10.1145/3338503.3357721]
                 [204]  Kan ZL, Wang HY, Wu L, Guo Y, Xu GA. Deobfuscating Android native binary code. In: Proc. of the 41st IEEE/ACM Int’l Conf. on
                      Software Engineering: Companion Proc. Montreal: IEEE, 2019. 322–323. [doi: 10.1109/ICSE-Companion.2019.00135]
                 [205]  Wang Y, Gu LZ, Li ZX, Yang YX. Protocol reverse engineering through dynamic and static binary analysis. The Journal of China
                      Universities of Posts and Telecommunications, 2013, 20(S2): 75–79. [doi: 10.1016/S1005-8885(13)60217-4]
                 [206]  Wasson  S.  Nvidia  claims  Haswell-class  performance  for  Denver  CPU  core.  2014.  https://techreport.com/news/26906/nvidia-claims-
                      haswell-class-performance-for-denver-cpu-core/
                 [207]  Brandalero  M,  Shafique  M,  Carro  L,  Beck  ACS.  TransRec:  Improving  adaptability  in  single-ISA  heterogeneous  systems  with
                      transparent and reconfigurable acceleration. In: Proc. of the 2019 Design, Automation & Test in Europe Conf. & Exhibition (DATE).
                      Florence: IEEE, 2019. 582–585. [doi: 10.23919/DATE.2019.8715121]
                 [208]  Hong DY, Lin SK, Fu SY, Wu JJ, Hsu WC. Enhancing transactional memory execution via dynamic binary translation. ACM SIGAPP
                      Applied Computing Review, 2019, 19(1): 48–58. [doi: 10.1145/3325061.3325065]

                 附中文参考文献:
                  [8]  李剑慧, 马湘宁, 朱传琪. 动态二进制翻译与优化技术研究. 计算机研究与发展, 2007, 44(1): 161–168. [doi: 10.1360/crad20070123]
                 [17]  胡伟武, 汪文祥, 吴瑞阳, 王焕东, 曾露, 徐成华, 高翔, 张福新. 龙芯指令系统架构技术. 计算机研究与发展, 2023, 60(1): 2–16. [doi:
                      10.7544/issn1000-1239.202220196]
                 [18]  李男, 庞建民. 基于中间表示规则替换的二进制翻译中间代码优化方法. 国防科技大学学报, 2021, 43(4): 156–162. [doi: 10.11887/
                      j.cn.202104019]
                 [24]  刘晓楠. 面向国产处理器的二进制翻译关键技术研究 [博士学位论文]. 郑州: 解放军信息工程大学, 2014.
                 [42]  马湘宁. 二进制翻译关键技术研究 [博士学位论文]. 北京: 中国科学院大学         (中国科学院计算技术研究所), 2004.
                 [91]  胡伟武, 靳国杰, 汪文祥, 张晓春, 王焕东. 龙芯指令系统融合技术. 中国科学: 信息科学, 2015, 45(4): 459–479. [doi: 10.1360/
                      N112014-00300]
                 [119]  傅立国, 庞建民, 王军, 张家豪, 岳峰. 二进制翻译正确性及优化方法的形式化模型. 计算机研究与发展, 2019, 56(9): 2001–2011.
                      [doi: 10.7544/issn1000-1239.2019.20180513]
                 [143]  文延华, 唐大国, 漆锋滨. 二进制翻译中的寄存器映射与剪裁的实现. 软件学报, 2009, 20: 1–7. http://www.jos.org.cn/1000-9825/
                      09001.htm
                 [157]  王军, 庞建民, 傅立国, 岳峰, 张家豪. 一种高效解决间接转移的反馈式静态二进制翻译方法. 计算机研究与发展, 2019, 56(4):
                      742–754. [doi: 10.7544/issn1000-1239.2019.20170412]
                 [162]  王军, 庞建民, 傅立国, 岳峰, 单征, 张家豪. 二进制翻译中动静结合的寄存器分配优化方法. 计算机研究与发展, 2019, 56(4):
                      708–718. [doi: 10.7544/issn1000-1239.2019.20170905]
                 [173]  王文文, 武成岗, 白童心, 王振江, 远翔, 崔慧敏. 二进制翻译中标志位的模式化翻译方法. 计算机研究与发展, 2014, 51(10): 2336–2347.
   141   142   143   144   145   146   147   148   149   150   151