共 67 条
- [1] Abdullah H., 2022, P 2 INT C INF TECHN
- [2] Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design [J]. 2022 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN, ICCAD, 2022,
- [3] [Anonymous], 2009, Offensive Security Exploit Database (Exploit-DB)
- [4] Arora D., 2024, arXiv
- [5] ARTist: The Android Runtime Instrumentation and Security Toolkit [J]. 2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 481 - 495
- [6] Chamornmarn T., 2019, P 2019 IEEE 6 AS C D, P1
- [8] Christey S., 2013, Common weakness enumeration
- [9] Computer Emergency Response Team (CERT), 1988, CERT Vulnerability Database
- [10] cwe.mitre, CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation