共 68 条
[21]
Hochreiter S, 1997, NEURAL COMPUT, V9, P1735, DOI [10.1162/neco.1997.9.8.1735, 10.1162/neco.1997.9.1.1, 10.1007/978-3-642-24797-2]
[22]
HP Fortify, US
[23]
Jernite Yacine, 2017, ARXIV
[24]
Joern, US
[25]
VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:595-614
[26]
King DB, 2015, ACS SYM SER, V1214, P1, DOI 10.1021/bk-2015-1214.ch001
[28]
CEREBRO: Context-Aware Adaptive Fuzzing for Effective Vulnerability Detection
[J].
ESEC/FSE'2019: PROCEEDINGS OF THE 2019 27TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING,
2019,
:533-544
[29]
Steelix: Program-State Based Binary Fuzzing
[J].
ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING,
2017,
:627-637