共 50 条
- [1] Binary code execution path based on symbolic and actual program execution Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (SUPPL. 2): : 2186 - 2192
- [2] Symbolic Execution of Obfuscated Code CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 732 - 744
- [3] Symbolic Execution of Programmable Logic Controller Code ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING, 2017, : 326 - 336
- [4] Code Obfuscation Against Symbolic Execution Attacks 32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 189 - 200
- [5] Directed Symbolic Execution for Binary Vulnerability Mining 2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 614 - 617
- [7] Distributed Symbolic Execution for Binary Software Testing 2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 618 - 621
- [8] Validating converted java code via symbolic execution Lecture Notes in Business Information Processing, 2017, 269 : 70 - 83
- [9] SECloud: Binary Analyzing Using Symbolic Execution in the Cloud 2013 INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2013, : 58 - 63
- [10] Loop-Extended Symbolic Execution on Binary Programs ISSTA 2009: INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, 2009, : 225 - 235