共 16 条
[2]
Black P.E., 2017, Journal of Cyber Security and Information Systems-Tools Testing Techniques for Assured Software-DoD Software Assurance Community of Practice, V2
[3]
Dahl WA, 2020, Arxiv, DOI arXiv:2012.15116
[4]
discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code
[J].
23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016),
2016,
[5]
Gutstein B., 2019, JULIET TEST SUITE C
[6]
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions
[J].
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2012,
:48-62
[7]
VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:595-614
[10]
VulPecker: An Automated Vulnerability Detection System Based on Code Similarity Analysis
[J].
32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016),
2016,
:201-213