共 68 条
[1]
Ahmadi M, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P2025
[2]
[Anonymous], 2014, arXiv
[3]
BinGo: Cross-Architecture Cross-OS Binary Search
[J].
FSE'16: PROCEEDINGS OF THE 2016 24TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON FOUNDATIONS OF SOFTWARE ENGINEERING,
2016,
:678-689
[4]
Checkmarx, About us
[5]
Hawkeye: Towards a Desired Directed Grey-box Fuzzer
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:2095-2108
[7]
Cho K., 2014, EMNLP 2014, DOI DOI 10.3115/V1/D14-1179
[8]
Chung J., 2014, NIPS 2014 WORKSHOP D
[9]
code.google, ROUGH AUDIT TOOL SEC
[10]
Collobert R., 2008, P 25 INT C MACH LEAR, P160, DOI [https://doi.org/10.1145/1390156.1390177, DOI 10.1145/1390156.1390177, DOI 10.1145/1390156.1390177.ICML08]