共 14 条
[1]
[Anonymous], 2013, CVE-2014-0160
[2]
[Anonymous], 2020, CHECK WHETHER TRIANG
[3]
[Anonymous], 2011, ARXIV181012556CS
[4]
[Anonymous], 2008, MICROSOFT ZUNE AFFEC
[5]
Identifying the Characteristics of Vulnerable Code Changes: An Empirical Study
[J].
22ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (FSE 2014),
2014,
:257-268
[6]
Automatic patch-based exploit generation is possible: Techniques and implications
[J].
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2008,
:143-+
[7]
Clark S, 2010, 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), P251
[8]
Hemmati Hadi, 2010, Proceedings of the 2010 IEEE 21st International Symposium on Software Reliability Engineering (ISSRE 2010), P141, DOI 10.1109/ISSRE.2010.9
[10]
An Analysis of the Search Spaces for Generate and Validate Patch Generation Systems
[J].
2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE),
2016,
:702-713