Login / Signup
Input generation via decomposition and re-stitching: finding bugs in Malware.
Juan Caballero
Pongsin Poosankam
Stephen McCamant
Domagoj Babic
Dawn Song
Published in:
CCS (2010)
Keyphrases
</>
reverse engineering
generation process
image decomposition
image sequences
input data
hierarchical decomposition
database
data sets
neural network
genetic algorithm
static analysis
decomposition method
method finds