共 18 条
[1]
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1145/2901739.2903508, 10.1109/MSR.2016.056]
[2]
Barker Elaine., 2019, Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography
[3]
Cooper Dave., 2008, INTERNET X 509 PUBLI, DOI DOI 10.17487/RFC5280
[4]
Egele Manuel., 2013, P 2013 ACM SIGSAC C, P73, DOI DOI 10.1145/2508859.2516693
[5]
Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:1143-1155
[6]
Falliere N., 2010, Stuxnet Dossier
[7]
Jun Gao, 2019, 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), P388, DOI 10.1109/MSR.2019.00065
[8]
Kang H., 2014, AndroTracker: creator information based Android malware classification system
[9]
Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1435-1448
[10]
K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:412-425