Auswahl der wissenschaftlichen Literatur zum Thema „Toolchain provenance“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Toolchain provenance" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Toolchain provenance"
Villa-Uriol, M. C., G. Berti, D. R. Hose, A. Marzo, A. Chiarini, J. Penrose, J. Pozo et al. „@neurIST complex information processing toolchain for the integrated management of cerebral aneurysms“. Interface Focus 1, Nr. 3 (06.04.2011): 308–19. http://dx.doi.org/10.1098/rsfs.2010.0033.
Der volle Inhalt der QuelleAbuhamad, Mohammed, Tamer Abuhmed, David Mohaisen und Daehun Nyang. „Large-scale and Robust Code Authorship Identification with Deep Feature Learning“. ACM Transactions on Privacy and Security 24, Nr. 4 (30.11.2021): 1–35. http://dx.doi.org/10.1145/3461666.
Der volle Inhalt der QuelleJang, Hohyeon, Nozima Murodova und Hyungjoon Koo. „ToolPhet: Inference of Compiler Provenance from Stripped Binaries with Emerging Compilation Toolchains“. IEEE Access, 2024, 1. http://dx.doi.org/10.1109/access.2024.3355098.
Der volle Inhalt der QuelleDissertationen zum Thema "Toolchain provenance"
Benoit, Tristan. „Cartographie des programmes et de leurs interrelations“. Electronic Thesis or Diss., Université de Lorraine, 2023. http://www.theses.fr/2023LORR0320.
Der volle Inhalt der QuelleIn the field of software engineering, ensuring the quality and security of software is complex. This context is due to a set of factors, notably the increasing use of libraries and the use of practices such as copying codes from online services. The usual solution to this problem is the application of formal methods for program validation before their release. However, this approach requires a precise specification and a high degree of expertise. This thesis introduces new reverse engineering methods to automatically collect information about a program toolchain provenance and identify program clones within large data repositories. Our first contribution is the innovative neural network model Site Neural Network (SNN), which predicts the compilation toolchain used to produce an entire program. SNN offers excellent speed as well as good accuracy. Its modularity due to the use of hierarchies of classifiers allows for easy consideration of additional toolchains. Our second contribution is the Program Spectral Similarity (PSS), a tool that provides a quick and efficient way to detect program clones, even when their target hardware architecture differs or in the case of obfuscation. Unlike binary function-based methods or graph edit distance methods, which are time-consuming and low resilient, PSS relies on the spectral analysis of graphs to measure the similarity between programs. This thesis thus contributes to cyber security by providing tools to identify malware clones quickly. In addition, it supports computer forensics by providing relevant information on the compilation chain. This work paves the way for new neural networks for programs, as well as the development of spectral graph analysis methods for studying binary code similarity
Konferenzberichte zum Thema "Toolchain provenance"
Rosenblum, Nathan, Barton P. Miller und Xiaojin Zhu. „Recovering the toolchain provenance of binary code“. In the 2011 International Symposium. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2001420.2001433.
Der volle Inhalt der QuelleBenoit, Tristan, Jean-Yves Marion und Sebastien Bardin. „Binary level toolchain provenance identification with graph neural networks“. In 2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 2021. http://dx.doi.org/10.1109/saner50967.2021.00021.
Der volle Inhalt der Quelle