1Anley C, Heasman J. The Shellcoder’s Handbook -Discovering and Exploiting Security Holes(2nd ed.). NewYork,USA: Wiley Publishing Inc., 2007.
2Choi JC, Han YM, Cho SJ,et al. A static birthmark for MSwindows applications using import address table. IEEE 7thInternational Conference on Innovative Mobile and InternetServices in Ubiquitous Computing (IMIS). Taiwan, China.2013.129-134.