共 18 条
[1]
Abadi M, 1998, LECT NOTES COMPUT SC, V1443, P868, DOI 10.1007/BFb0055109
[2]
BELL DE, 1973, ESDTR73278 MITRE COR, V1, P61405
[3]
Ceara Dumitru, 2010, Proceedings of the IEEE Third International Conference on Software Testing Verification and Validation - Workshops (ICSTW 2010), P371, DOI 10.1109/ICSTW.2010.28
[4]
The Correctness-Security Gap in Compiler Optimization
[J].
2015 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW),
2015,
:73-87
[6]
Denning D. E., 1975, THESIS
[9]
Gondi K., 2012, Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASPY '12, P295
[10]
Howard M., 2002, SCRUBBING SECRETS ME