共 36 条
- [1] Alsaheel A, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P3005
- [2] Bates A, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P319
- [3] Staudemeyer RC, 2019, Arxiv, DOI arXiv:1909.09586
- [4] Ding HL, 2023, PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, P3277
- [5] F. T. Intelligence, Second adobe flash zero-day cve-2015-5122 from hackingteam exploited in strategic web compromise targeting japanese victims
- [7] Han X., 2018, 10 USENIX WORKSHOP T
- [8] Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics [J]. 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 1139 - 1155
- [9] Hossain MN, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1723
- [10] Hossain MN, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P487