3Flake H.Structural comparison of executable objects[].Proceedings of the IEEE Conference on Detection of Intrusions and Malware and Vulnerability Assessment(DIMVA).2004
4Sabin T.Comparing binaries with graph isomorphisms. http://razor.bindview.com/publish/papers/comparing-binaries.ht ml . 2004
5D.Brumley,P.Poosankam,D.Song,J.Zheng."Automatic Patch-Based Exploit Generation is Possible:Techniques and Implications,"[].Security and PrivacySP IEEE Symposium on.2008