-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy paththesis.bib
202 lines (181 loc) · 6.63 KB
/
thesis.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
@misc{cvelinux,
title = {Linux Linux Kernel: CVE security vulnerabilities, versions and detailed reports},
howpublished = {\url{http://www.cvedetails.com/product/47/Linux-Linux-Kernel.html?vendor_id=33}},
}
@misc{rustbelt,
title = {RustBelt},
howpublished = {\url{http://plv.mpi-sws.org/rustbelt/}},
}
@misc{promiserepo,
authors = "Menzies, T., Krishna, R., Pryor, D.",
year = 2015,
title = "The Promise Repository of
Empirical Software Engineering
Data",
notes = "http://openscience.us/repo. North
Carolina State University,
Department of Computer Science"
}
@inproceedings{cadar2008klee,
title={KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs.},
author={Cadar, Cristian and Dunbar, Daniel and Engler, Dawson R and others},
booktitle={OSDI},
volume={8},
pages={209--224},
year={2008}
}
@article{enck2014taintdroid,
title={TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones},
author={Enck, William and Gilbert, Peter and Han, Seungyeop and Tendulkar, Vasant and Chun, Byung-Gon and Cox, Landon P and Jung, Jaeyeon and McDaniel, Patrick and Sheth, Anmol N},
journal={ACM Transactions on Computer Systems (TOCS)},
volume={32},
number={2},
pages={5},
year={2014},
publisher={ACM}
}
@article{gao2011choosing,
title={Choosing software metrics for defect prediction: an investigation on feature selection techniques},
author={Gao, Kehan and Khoshgoftaar, Taghi M and Wang, Huanjing and Seliya, Naeem},
journal={Software: Practice and Experience},
volume={41},
number={5},
pages={579--606},
year={2011},
publisher={Wiley Online Library}
}
@inproceedings{gori2005new,
title={A new model for learning in graph domains},
author={Gori, Marco and Monfardini, Gabriele and Scarselli, Franco},
booktitle={Neural Networks, 2005. IJCNN'05. Proceedings. 2005 IEEE International Joint Conference on},
volume={2},
pages={729--734},
year={2005},
organization={IEEE}
}
@inproceedings{huang2015code,
title={Code Coverage Measurement for Android Dynamic Analysis Tools},
author={Huang, Chun-Ying and Chiu, Ching-Hsiang and Lin, Chih-Hung and Tzeng, Han-Wei},
booktitle={Mobile Services (MS), 2015 IEEE International Conference on},
pages={209--216},
year={2015},
organization={IEEE}
}
@article{khoshgoftaar2009attribute,
title={Attribute selection using rough sets in software quality classification},
author={Khoshgoftaar, Taghi M and Bullard, Lofton A and Gao, Kehan},
journal={International Journal of Reliability, Quality and Safety Engineering},
volume={16},
number={01},
pages={73--89},
year={2009},
publisher={World Scientific}
}
@article{kosmidis2017machine,
title={Machine Learning and Images for Malware Detection and Classification},
author={Kosmidis, Konstantinos},
year={2017}
}
@article{lessmann2008benchmarking,
title={Benchmarking classification models for software defect prediction: A proposed framework and novel findings},
author={Lessmann, Stefan and Baesens, Bart and Mues, Christophe and Pietsch, Swantje},
journal={IEEE Transactions on Software Engineering},
volume={34},
number={4},
pages={485--496},
year={2008},
publisher={IEEE}
}
@article{li2015gated,
title={Gated graph sequence neural networks},
author={Li, Yujia and Tarlow, Daniel and Brockschmidt, Marc and Zemel, Richard},
journal={arXiv preprint arXiv:1511.05493},
year={2015}
}
@article{valgrind,
author = {Nethercote, Nicholas and Seward, Julian},
title = {Valgrind: A Framework for Heavyweight Dynamic Binary Instrumentation},
journal = {SIGPLAN Not.},
issue_date = {June 2007},
volume = {42},
number = {6},
month = jun,
year = {2007},
issn = {0362-1340},
pages = {89--100},
numpages = {12},
url = {http://doi.acm.org/10.1145/1273442.1250746},
doi = {10.1145/1273442.1250746},
acmid = {1250746},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {Memcheck, Valgrind, dynamic binary analysis, dynamic binary instrumentation, shadow values},
}
@inproceedings{neuhaus2007predicting,
title={Predicting vulnerable software components},
author={Neuhaus, Stephan and Zimmermann, Thomas and Holler, Christian and Zeller, Andreas},
booktitle={Proceedings of the 14th ACM conference on Computer and communications security},
pages={529--540},
year={2007},
organization={ACM}
}
@article{newsome2005dynamic,
title={Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software},
author={Newsome, James and Song, Dawn},
year={2005},
publisher={Internet Society}
}
@inproceedings{niepert2016learning,
title={Learning convolutional neural networks for graphs},
author={Niepert, Mathias and Ahmed, Mohamed and Kutzkov, Konstantin},
booktitle={Proceedings of the 33rd annual international conference on machine learning. ACM},
year={2016}
}
@article{shervashidze2011weisfeiler,
title={Weisfeiler-lehman graph kernels},
author={Shervashidze, Nino and Schweitzer, Pascal and Leeuwen, Erik Jan van and Mehlhorn, Kurt and Borgwardt, Karsten M},
journal={Journal of Machine Learning Research},
volume={12},
number={Sep},
pages={2539--2561},
year={2011}
}
@inproceedings{shin2015recognizing,
title={Recognizing Functions in Binaries with Neural Networks.},
author={Shin, Eui Chul Richard and Song, Dawn and Moazzezi, Reza},
booktitle={USENIX Security},
pages={611--626},
year={2015}
}
@inproceedings{wang2016automatically,
title={Automatically learning semantic features for defect prediction},
author={Wang, Song and Liu, Taiyue and Tan, Lin},
booktitle={Proceedings of the 38th International Conference on Software Engineering},
pages={297--308},
year={2016},
organization={ACM}
}
@inproceedings{yamaguchi2014modeling,
title={Modeling and discovering vulnerabilities with code property graphs},
author={Yamaguchi, Fabian and Golde, Nico and Arp, Daniel and Rieck, Konrad},
booktitle={Security and Privacy (SP), 2014 IEEE Symposium on},
pages={590--604},
year={2014},
organization={IEEE}
}
@inproceedings{yuan2014droid,
title={Droid-sec: deep learning in android malware detection},
author={Yuan, Zhenlong and Lu, Yongqiang and Wang, Zhaoguo and Xue, Yibo},
booktitle={ACM SIGCOMM Computer Communication Review},
volume={44},
number={4},
pages={371--372},
year={2014},
organization={ACM}
}
@article{choi2017end,
title={End-to-End Prediction of Buffer Overruns from Raw Source Code via Neural Memory Networks},
author={Choi, Min-je and Jeong, Sehun and Oh, Hakjoo and Choo, Jaegul},
journal={arXiv preprint arXiv:1703.02458},
year={2017}
}