共 43 条
[1]
National Vulnerability Database
[2]
Engler D, Chen D Y, Hallem S, Et al., Bugs as deviant behavior: A general approach to inferring errors in systems code, SIGPS Operating Systems Review, 35, 5, pp. 57-72, (2001)
[3]
Jang J, Agrawal A, Brumley D., ReDeBug: Finding unpatched code clones in entire OS distributions, Proc of 2012 IEEE Symp on Security and Privacy, pp. 48-62, (2012)
[4]
Cadar C, Dunbar D, Engler D R., KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs, Proc of the 8th USENIX Symp on Operating Systems Design and Implementation, pp. 209-224, (2009)
[5]
Li Zhen, Zou Deqing, Wang Zeli, Et al., Overview of source code oriented software vulnerability static detection, Journal of Network and Information Security, 5, 1, pp. 1-14, (2019)
[6]
Sutton M, Greene A, Amini P., Fuzzing: Brute Force Vulnerability Discovery, (2007)
[7]
Newsome J., Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software, Chinese Journal of Engineering Mathematics, 29, 5, pp. 720-724, (2005)
[8]
Lin Guangjun, Zhang Jun, Luo Wei, Et al., Cross-project transfer representation learning for vulnerable function discovery, IEEE Transactions on Industrial Informatics, 14, 7, pp. 3289-3297, (2018)
[9]
Agrawal A, Menzies T., Is "better data" better than "better data miners"?: On the benefits of tuning SMOTE for defect prediction, Proc of the 40th Int Conf on Software Engineering, pp. 1050-1061, (2018)
[10]
Zou Quanchen, Zhang Tao, Wu Runpu, Et al., From automation to intelligence: Survey of research on vulnerability discovery techniques, Journal of Tsinghua University: Science and Technology, 58, 12, pp. 45-60, (2018)