References
- Marco Pistoia, Satish Chandra, Stephen J. Fink, and Eran Yahav, "A survey of static analysis methods for identifying security vulnerabilities in software systems," IBM Systems Journal, Vol. 46, No.2, pp. 265-288, 2007. https://doi.org/10.1147/sj.462.0265
- Manuel Egele, Theodoor Scholte, Engin Kirda, Christopher Kruegel, "A Survey on Automated Dynamic Malware Analysis Techniques and Tools," ACM Computing Surveys, Vol. 44, No.2, Feb. 2012.
- Jeong-Hoon Jeon, "A study on the classification systems of domestic security fields," Journal of the Korea Society of Computer and Information, Vol. 20, No. 3, pp. 81-88, March 2015. https://doi.org/10.9708/jksci.2015.20.3.081
- Eun-Gyoem Jang, Sang Jun Lee, Joong In Lee, "A Study on Similarity Comparison for File DNA-Based Metamorphic Malware Detection," Journal of the Korea Society of Computer and Information, Vol. 19, No. 1, pp. 85-94, Jan. 2014. https://doi.org/10.9708/JKSCI.2014.19.1.085
- James Newsome and Dawn Song, "Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software," In Proceedings of the Network and Distributed System Security Symposium, 2005.
- Winnie Cheng, Qin Zhao, Bei Yu, and Scott Hiroshige, "TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting," In Proceedings of 11th IEEE Symposium on Computers and Communications, pp. 749-754, June 2006.
- James Clause, Wanchun Li, and Ro Orso, "Dytan: A Generic Dynamic Taint Analysis Framework," In Proceedings of the International Symposium on Software Testing and Analysis, pp. 196-206, 2007.
- Zhiwen Bai, Liming Wang, Jinglin Chen, Lin Xu, Jian Liu, and Xiyang Liu, "DTAD: A Dynamic Taint Analysis Detector for Information Security," In Proceedings of The Ninth International Conference on Web-Age Information Management, pp. 591-597, July 2008.
- Heng Yin, Dawn Song, Manuel Egele, Christopher Kruegel, and Engin Kirda, "Panorama: capturing system-wide information flow for malware detection and analysis," In Proceedings of the 14th ACM conference on Computer and communications security, pp. 116-127, 2007.
- Matthew Hennessy, "The WHILE programming language," https://www.cs.tcd.ie/Matthew.Hennessy/splexternal2015/notes/WhileSlides2to1.pdf, 2015.
- Kenneth Slonneger and Barry L. Kurtz, "Formal Syntax and Semantics of Programming Languages," Addison Wesley, 1995.
- Sanjiva Prasad and S. Arun-Kumar, "An Introduction to Operational Semantics," In the Compiler Design Handbook: Optimizations and Machine Code Generation, pp. 841-890, CRC Press, 2002.
- Programming Language Haskell, http://www.haskell.org/