References
- M. Belaoued and S. Mazouzi, "A chi-square-based decision for real-time malware detection using PE-file features," Journal of Information Processing Systems, vol. 12, no. 4, pp. 644-660, 2016. https://doi.org/10.3745/JIPS.03.0058
- S. Sabharwal and M. Aggarwal, "Test set generation for pairwise testing using genetic algorithms," Journal of Information Processing Systems, vol. 13, no. 5, pp. 1089-1102, 2017. https://doi.org/10.3745/JIPS.04.0019
- ARMv7-M Architecture Reference Manual [Online]. Available: http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0403-e.b/index.html.
- D. Xu, "A tool for automated test code generation from high-level Petri nets," in Application and Theory of Petri Nets. Heidelberg: Springer, 2011, pp. 308-317.
- M. Conrad, "Testing-based translation validation of generated code in the context of IEC 61508," Formal Methods in System Design, vol. 35, no. 3, pp. 389-401, 2009. https://doi.org/10.1007/s10703-009-0082-0
- R. Marvie, "An introduction to test-driven code generation," [Online]. Available: http://ojs.pythonpapers.org/index.php/tpp/article/download/50/47.
- N. Hasabnis, R. Qiao, and R. Sekar, "Checking correctness of code generator architecture specifications," in Proceedings of 2015 IEEE/ACM International Symposium on Code Generation and Optimization (CGO), San Francisco, CA, 2015, pp. 167-178.
- TIS Committee, "Tool Interface Standard (TIS) Executable and Linking Format (ELF) Specification version 1.2," 1995 [Online]. Available: http://refspecs.linuxbase.org/elf/elf.pdf.
- Shellcode [Online]. Available: https://en.wikipedia.org/wiki/Shellcode#cite_note-11.
- J. C. Foster, Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals. Rockland, MA: Syngress Publishing, 2005.
- Trampoline [Online]. Available: https://en.wikipedia.org/wiki/Trampoline_(computing).
- H. G. Baker, "CONS should not CONS its arguments, Part II: Cheney on the MTA," ACM SIGPLAN Notices, vol. 30, no. 9, pp. 17-20, 1995. https://doi.org/10.1145/214448.214454
- C. DiBona and S. Ockman, Open sources: Voices from the Open Source Revolution. Sebastopol, CA: O'Reilly Media Inc., 1999.
- M. M. Tajwar, M. Pathan, L. Hussaini, and A. Abubakar, "CPU scheduling with a round robin algorithm based on an effective time slice," Journal of Information Processing Systems, vol. 13, no. 4, pp. 941-950, 2017. https://doi.org/10.3745/JIPS.01.0018
- R. P. Weicker, "Dhrystone: a synthetic systems programming benchmark," Communications of the ACM, vol. 27, no. 10, pp. 1013-1030, 1984. https://doi.org/10.1145/358274.358283
- H. J. Curnow and B. A. Wichman, "A synthetic benchmark," The Computer Journal, vol. 19, no. 1, pp. 43-49, 1976. https://doi.org/10.1093/comjnl/19.1.43
- M. R. Guthaus, J. S. Ringenberg, D. Ernst, T. M. Austin, T. Mudge, and R. B. Brown, "MiBench: a free, commercially representative embedded benchmark suite," in Proceedings of the 4th Annual IEEE International Workshop on Workload Characterization (Cat. No. 01EX538), Austin, TX, 2001, pp. 3-14.