共 65 条
- [1] [Anonymous], 2012, P 15 ANN INT C INF S
- [2] Aviram N, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P689
- [3] Bard G.V., 2004, IACR Cryptology ePrint Archive, V2004
- [4] Vulnerability Assessment in Autonomic Networks and Services: A Survey [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (02): : 988 - 1004
- [5] Bleichenbacher D, 1998, LECT NOTES COMPUT SC, V1462, P1, DOI 10.1007/BFb0055716
- [6] Brown P. F., 1992, Computational Linguistics, V18, P467
- [7] Input Generation via Decomposition and Re-Stitching: Finding Bugs in Malware [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 413 - 425
- [8] Postcards from the Post-HTTP World: Amplification of HTTPS Vulnerabilities in the Web Ecosystem [J]. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 281 - 298
- [9] Clause J., 2007, ISSTA 07, P196, DOI 10.1145/1273463.1273490
- [10] Static detection of vulnerabilities in x86 executables [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 269 - +