2Flake H. Structural comparison of executable objects [C]// Proceedings of the IEEE Conference on Detection of Intrusions, Malware, and Vulnerability Assessment. Dortmund, Germany: SIG SIDAR, 2004.
3Sabin T. Comparing binaries with graph isomorphisms [Z/OL]. (2011-06 25), http= //razor. bindview. com/publish/papers/comparing-binaries, html, 2004.
4Brumley D, Poosankam P, Song D, Jiang Z. Automatic patch-based exploit generation is possible: Techniques and implications, security and privacy [C]// Proceedings of the IEEE Symposium on Security and Privacy. California, USA: IEEE Computer Society, 2008:143 -157.
5eEye Security. eEye binary diffing suite (EBDS) [Z/OL]. (2011-06-25), http://research. eeye. com/html/tools/ RT20060801 1. htm 1. Version 1.0.5.
6Brumley D, Caballero J, Liang Z, Newsome J, Song D. Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation [C]// Proceedings of the USENIX Security Symposium. Boston, USA: USENIX, 2007.
7Software Security Research. Group, School of Software and Mieroelectronics, Peking University. [Z/OL]. (2011 06-25), http : / / www. pku-exploit, corn/.