共 32 条
[1]
Ali K, 2012, LECT NOTES COMPUT SC, V7313, P688, DOI 10.1007/978-3-642-31057-7_30
[2]
[Anonymous], 2013, Proceedings of the 22Nd USENIX Conference on Security, SEC'13
[3]
[Anonymous], 2011, USENIX SECURITY S
[4]
[Anonymous], 2012, P 10 INT C MOB SYST
[5]
[Anonymous], P 21 USENIX C SEC S
[6]
[Anonymous], 2013, P 29 ANN COMPUTER SE
[7]
[Anonymous], 2014, Communications of the ACM, DOI DOI 10.1145/2494522
[8]
[Anonymous], 2013, Proceedings of the 29th Annual Computer Security Applications Conference
[9]
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]
[10]
Bush WR, 2000, SOFTWARE PRACT EXPER, V30, P775, DOI 10.1002/(SICI)1097-024X(200006)30:7<775::AID-SPE309>3.0.CO