共 30 条
- [1] [Anonymous], 2016, NDSS
- [2] Anvik J., 2006, P 28 INT C SOFTW ENG, P361, DOI DOI 10.1145/1134285.1134336
- [3] Behl D, 2014, PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), P294, DOI 10.1109/ICROIT.2014.6798341
- [4] Do Bugs Foreshadow Vulnerabilities? A Study of the Chromium Project [J]. 12TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2015), 2015, : 269 - 279
- [7] TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2014, 32 (02):
- [8] Gegick Michael, 2010, Proceedings of the 2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010), P11, DOI 10.1109/MSR.2010.5463340
- [9] Haller I., 2013, Proceedings of the 22Nd USENIX Conference on Security, P49
- [10] ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions [J]. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 48 - 62