DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cha, Sang Kil | ko |
dc.contributor.author | Liang, Zhenkai | ko |
dc.date.accessioned | 2020-11-25T00:50:06Z | - |
dc.date.available | 2020-11-25T00:50:06Z | - |
dc.date.created | 2020-11-23 | - |
dc.date.created | 2020-11-23 | - |
dc.date.issued | 2020-04 | - |
dc.identifier.citation | COMMUNICATIONS OF THE ACM, v.63, no.4, pp.86 - 88 | - |
dc.identifier.issn | 0001-0782 | - |
dc.identifier.uri | http://hdl.handle.net/10203/277594 | - |
dc.description.abstract | BINARY CODE ANALYSIS (binary analysis, for short) is a vital security approach for protecting commercial off-the-shelf (COTS) software and understanding malware, where there is no source code available. From the perspective of computer security, it is imperative to analyze binary code, as source-level scrutiny does not always reveal lurking software bugs due to compiler or interpreter misbehavior. Since the late 1990s, there has been significant research interest worldwide on binary analysis. | - |
dc.language | English | - |
dc.publisher | ASSOC COMPUTING MACHINERY | - |
dc.title | Asia's Surging Interest in Binary Analysis | - |
dc.type | Article | - |
dc.identifier.wosid | 000582585200027 | - |
dc.identifier.scopusid | 2-s2.0-85082474412 | - |
dc.type.rims | ART | - |
dc.citation.volume | 63 | - |
dc.citation.issue | 4 | - |
dc.citation.beginningpage | 86 | - |
dc.citation.endingpage | 88 | - |
dc.citation.publicationname | COMMUNICATIONS OF THE ACM | - |
dc.identifier.doi | 10.1145/3378424 | - |
dc.contributor.localauthor | Cha, Sang Kil | - |
dc.contributor.nonIdAuthor | Liang, Zhenkai | - |
dc.description.isOpenAccess | Y | - |
dc.type.journalArticle | Article | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.