共 57 条
- [1] Comparing the Usability of Cryptographic APIs [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 154 - 171
- [2] CRYPTOAPI-BENCH: A Comprehensive Benchmark on Java']Java Cryptographic API Misuses [J]. 2019 IEEE SECURE DEVELOPMENT (SECDEV 2019), 2019, : 49 - 61
- [3] Ami AS, 2022, P IEEE S SECUR PRIV, P614, DOI [10.1109/SP46214.2022.00024, 10.1109/SP46214.2022.9833582]
- [4] Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]
- [5] Bugcrowd, 2023, Bugcrowd: Crowdsourced Cybersecurity Platform
- [6] Towards Automated Dynamic Analysis for Linux-based Embedded Firmware [J]. 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
- [7] IOTFUZZER: Discovering Memory Corruptions in IoT Through App-based Fuzzing [J]. 25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,
- [8] Chen Yikang, 2024, NDSS
- [9] Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 437 - 448
- [10] Costin A, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P95