共 36 条
[1]
AKRAM J, 2019, INT J INF COMPUT SEC, V11, P1
[4]
VCIPR: Vulnerable Code is Identifiable When a Patch is Released (Hacker's Perspective)
[J].
2019 IEEE 12TH CONFERENCE ON SOFTWARE TESTING, VALIDATION AND VERIFICATION (ICST 2019),
2019,
:402-413
[5]
DroidCC: A Scalable Clone Detection Approach for Android Applications to Detect Similarity at Source Code Level
[J].
2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1,
2018,
:100-105
[6]
Akram Junaid, 2018, P SEKE 2018 30 INT C, P354
[10]
Automatic patch-based exploit generation is possible: Techniques and implications
[J].
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2008,
:143-+