Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
scalable framework
biblio
Scalable Framework for Accurate Binary Code Comparison
Submitted by grigby1 on Wed, 06/20/2018 - 11:50am
maximum common subgraph
CG
comparison algorithm
empiric results heuristic method
exact matches
extensive binaries
forward slicing
functions matching process parallelization
heavily modified functions
high matching quality
IdaPro disassembler
main stages
matched vertices
matching process
call graph
old versions
PDG
practical applications
program dependence graph
programmatic changes
real world libraries
scalable framework
slightly modified functions
statically linked libraries
target program
unchanged modified functions
well-known bugs prevention
Libraries
graph theory
privacy
pubcrawl
Human behavior
invasive software
Algorithm design and analysis
tools
Semantics
Cloning
program diagnostics
Malware Analysis
resilience
Metrics
static analysis
Computer bugs
Resiliency
program debugging
Program slicing
Binary codes
accurate binary code comparison
backward slicing
binary code clone detection
Binary code comparison
binary files
Binnavi platform
calculated heuristics
biblio
"Ctracer: Uncover C amp;amp;C in Advanced Persistent Threats Based on Scalable Framework for Enterprise Log Data"
Submitted by abfox on Tue, 02/14/2017 - 11:05am
scalable framework
internet
invasive software
Itemsets
malware
MapReduce
network signature
networking logs
pubcrawl170101
hackers
Security Operations Center
Servers
SoC
stealthy activities detection
stealthy command and control channel detection
targeted attacks
traffic data
Computer crime
Advanced Persistent Threat (APT)
APT attack
business data processing
C&C channel
C&C sessions
C)
Command and Control (C&
command and control systems
advanced persistent threat
Computers
Ctracer
Digital Forensics
digital signatures
Electronic mail
enterprise log data
forensic report