共 37 条
[1]
[Anonymous], P 5 INT C NETW SYST
[2]
[Anonymous], 2007, P 14 ACM C COMP COMM
[3]
[Anonymous], 2007, ESEC FSE 2007
[4]
BALIGA A, 2008, P 24 ANN COMP SEC AP
[5]
Lurking in the shadows: Identifying systemic threats to kernel data (Short paper)
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:246-+
[6]
Blackburn B., 1999, B BLACKBURN WORLDS F
[7]
CUI W, 2005, P 21 ACSAC, P361
[10]
Analyzing Information Flow in Java']JavaScript-based Browser Extensions
[J].
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE,
2009,
:382-391