Computer Science ›› 2022, Vol. 49 ›› Issue (11): 49-54.doi: 10.11896/jsjkx.210900230
• Computer Software • Previous Articles Next Articles
SHI Rui-heng, ZHU Yun-cong, ZHAO Yi-ru, ZHAO Lei
CLC Number:
[1]ARCE I.The shellcode generation[J].IEEE Security & Privacy,2004,2(5):72-76. [2]ROEMER R,BUCHANAN E,SHACHAM H,et al.Return-oriented programming:Systems,languages,and applications[J].ACM Transactions on Information and System Security(TISSEC),2012,15(1):1-34. [3]VISHNYAKOV A V,NURMUKHAMETOV A R.Survey ofMethods for Automated Code-Reuse Exploit Generation[J].Programming and Computer Software,2021,47(4):271-297. [4]BUCHANAN E,ROEMER R,SHACHAM H,et al.When good instructions go bad:Generalizing return-oriented programming to RISC[C]//Proceedings of the 15th ACM Conference on Computer and Communications Security.2008:27-38. [5]BAO T,WANG R,SHOSHITAISHVILI Y,et al.Your exploit is mine:Automatic Shellcode transplant for remote exploits[C]//2017 IEEE Symposium on Security and Privacy(SP).IEEE,2017:824-839. [6]NEWSOME J,SONG D X.Dynamic Taint Analysis for Auto-matic Detection,Analysis,and Signature Generation of Exploits on Commodity Software[C]//NDSS.2005:3-4. [7]KANG M G,MCCAMANT S,POOSANKAM P,et al.Dta++:dynamic taint analysis with targeted control-flow propagation[C]//NDSS.2011. [8]CHARNIAK E.Tree-bank grammars[C]//Proceedings of the National Conference on Artificial Intelligence.1996:1031-1036. [9]YOU W,ZONG P,CHEN K,et al.Semfuzz:Semantics-basedautomatic generation of proof-of-concept exploits[C]//Procee-dings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.2017:2139-2154. [10]CHOWDHARY K R.Natural language processing[M]//Fundamentals of Artificial Intelligence.New Delhi:Springer,2020:603-649. [11]LAM M S,MARTIN M,LIVSHITS B,et al.Securing web applications with static and dynamic information flow tracking[C]//Proceedings of the 2008 ACM SIGPLAN symposium on Partial Evaluation and Semantics-based Program Manipulation.2008:3-12. |
[1] | HAN Xiao, ZHANG Zhe-qing, YAN Li. Temporal RDF Modeling Based on Relational Database [J]. Computer Science, 2022, 49(11): 90-97. |
[2] | SHI Kun, ZHOU Yong, ZHANG Qi-liang, JIANG Shun-rong. Privacy-preserving Scheme of Energy Trading Data Based on Consortium Blockchain [J]. Computer Science, 2022, 49(11): 335-344. |
[3] | CHENG Wen, LI Yan, ZENG Ling-fang, WANG Fang, TANG Shi-cheng, YANG Li-ping, FENG Dan, ZENG Wen-jun. Error Log Analysis and System Optimization for Lustre Cluster Storage [J]. Computer Science, 2022, 49(10): 1-9. |
[4] | LI Yi-cong, ZHOU Kuan-jiu, WANG Zi-zhong, XU Lin. ZKFERP:Universal and Efficient Range Proof Scheme with Constant Computational Cost [J]. Computer Science, 2022, 49(10): 335-343. |
[5] | HU Yu-jiao, JIA Qing-min, SUN Qing-shuang, XIE Ren-chao, HUANG Tao. Functional Architecture to Intelligent Computing Power Network [J]. Computer Science, 2022, 49(9): 249-259. |
[6] | LI Meng-fei, MAO Ying-chi, TU Zi-jian, WANG Xuan, XU Shu-fang. Server-reliability Task Offloading Strategy Based on Deep Deterministic Policy Gradient [J]. Computer Science, 2022, 49(7): 271-279. |
[7] | WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126. |
[8] | LIU Li, LI Ren-fa. Control Strategy Optimization of Medical CPS Cooperative Network [J]. Computer Science, 2022, 49(6A): 39-43. |
[9] | SHEN Chao, HE Xi-ping. Face Anti-spoofing Algorithm Based on Texture Feature Enhancement and Light Neural Network [J]. Computer Science, 2022, 49(6A): 390-396. |
[10] | LIU Yun, DONG Shou-jie. Acceleration Algorithm of Multi-channel Video Image Stitching Based on CUDA Kernel Function [J]. Computer Science, 2022, 49(6A): 441-446. |
[11] | ZHU Xu-hui, SHEN Guo-jiao, XIA Ping-fan, NI Zhi-wei. Model Based on Spirally Evolution Glowworm Swarm Optimization and Back Propagation Neural Network and Its Application in PPP Financing Risk Prediction [J]. Computer Science, 2022, 49(6A): 667-674. |
[12] | YANG Xiao-yu, YIN Kang-ning, HOU Shao-qi, DU Wen-yi, YIN Guang-qiang. Person Re-identification Based on Feature Location and Fusion [J]. Computer Science, 2022, 49(3): 170-178. |
[13] | CHEN Gui-qiang, HE Jun. Study on Super-resolution Reconstruction Algorithm of Remote Sensing Images in Natural Scene [J]. Computer Science, 2022, 49(2): 116-122. |
[14] | LI Yu, DUAN Hong-yue, YIN Yu-yu, GAO Hong-hao. Survey of Crowdsourcing Applications in Blockchain Systems [J]. Computer Science, 2021, 48(11): 12-27. |
[15] | LIAN Wen-juan, ZHAO Duo-duo, FAN Xiu-bin, GENG Yu-nian, FAN Xin-tong. CFL_BLP_BC Model Based on Authentication and Blockchain [J]. Computer Science, 2021, 48(11): 36-45. |
|