Computer Science ›› 2013, Vol. 40 ›› Issue (10): 119-121.
Previous Articles Next Articles
NIU Wei-na,DING Xue-feng,LIU Zhi and ZHANG Xiao-song
[1] 王彤彤,韩文报,王航.基于安全需求的软件漏洞分析模型[J].计算机科学,2007,34(9):287-289 [2] 毛澄映,卢炎生,胡小华.数据挖掘技术在软件工程中的应用综述[J].计算机科学,2009,6(5):1-6 [3] Brumley D,Poosankam P,et al.Automatic patch-based exploit generation is possible:techniques and implications[C]∥ SP’08:Proceedings of the IEEE Security and Privacy Symposium.NJ:IEEE,2008:143-157 [4] 宋超臣,黄俊强,等.计算机安全漏洞检测技术综述[J].技术研究,2012,1:77-79 [5] 吴志勇,王红川,等.Fuzzing技术综述[J].计算机应用研究,2010,7(3):829-832 [6] Miller B P,Fredriksenl.An empirical Study of the reliability of UNIX utilities [J].Communications of the ACM,1990,33(12):32-44 [7] Miller Barton P,Gergogy C,Fresrick M.An empirical study of the robustness of MacOS applications using random testing[C]∥Proceedings of the 1st International Workshop on Random Testing.New York:ACM,2006:46-54 [8] 陈衍铃,赵静.基于虚拟化技术的动态污点分析[J].计算机应用,2011,1(9):2367-2372 [9] Cowbc,Pu C,et al.StackGuard:Automatic adaptive detectionand prevention of buffer-overflow attacks[C]∥Proceedings of the 7th conference on USENIX Security Symposium.Berkeley,1998:5-13 [10] King J C.Symbolic execution and program testing[C]∥Communications of the ACM.1976:385-394 [11] 过辰楷,姬秀娟,许静.基于分支混淆算法的符号执行技术 [J].计算机科学,2012,9(9):115-119 [12] Cadar C,Ganesh V,et al.EXE:Automatically generating inputs of death[C]∥CCS’06:Proceedings of the 13th ACM Confe-rence on Computer and Communications Security.New York:ACM,2006:322-335 [13] Luk C-K,Robert C,et al.Pin:building customized program an-alysis tools with dynamic instrumentation[C]∥PLDI05:Procee-dings of the ACM SIGPLAN Conference on Programming Language Design and Implementation.New York:ACM,2005:190-200 [14] De Moura,Leonardo,Bjrner,et al.Z3:an efficient SMT Solver[C]∥TACAS:Proceedings 14th International Conference.Berlin:Springer,2008:337-340 [15] 魏瑜豪,张玉清.基于fuzzing的MP3播放软件漏洞发掘技术[J].计算机工程,2007,33(24):158-167 |
No related articles found! |
|