共 99 条
[81]
Reps T., 1995, Conference Record of POPL'95: 22nd ACM SIGPLAN-SIGACT Symposium Principles of Programming Languages, P49, DOI 10.1145/199448.199462
[82]
Analysis of Android Inter-App Security Vulnerabilities Using COVERT
[J].
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 2,
2015,
:725-728
[84]
Schmeelk S., 2015, P 10 ANN CYB INF SEC, P1, DOI [10.1145/2746266.2746271, DOI 10.1145/2746266.2746271]
[85]
Scholz B, 2008, PROCEEDINGS OF EIGHT
[87]
Sharir M., 1978, 2 APPROACHES INTERPR
[88]
Shekhar S., 2012, 21 USENIX SEC S USEN, P553
[89]
Spyridi A. J., 1990, Proceedings 1990 IEEE International Conference on Robotics and Automation (Cat. No.90CH2876-1), P1284, DOI 10.1109/ROBOT.1990.126176