共 37 条
[1]
[Anonymous], 2007, Secure programming with static analysis
[2]
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2594291.2594299, 10.1145/2666356.2594299]
[3]
Babic D., 2011, P 2011 INT S SOFTW T, P12, DOI DOI 10.1145/2001420.2001423
[5]
Bell D. E., 1973, Tech. Rep. 2547
[6]
Information-Flow Preservation in Compiler Optimisations
[J].
2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019),
2019,
:230-242
[7]
Securing Compilation Against Memory Probing
[J].
PLAS'18: PROCEEDINGS OF THE 13TH WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY,
2018,
:29-40
[9]
Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications
[J].
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17),
2017,
:71-85
[10]
Ceara Dumitru, 2010, Proceedings of the IEEE Third International Conference on Software Testing Verification and Validation - Workshops (ICSTW 2010), P371, DOI 10.1109/ICSTW.2010.28