共 24 条
- [1] [Anonymous], EFFECTIVE SEARCH SPA
- [2] [Anonymous], 2006, P 13 ACM C COMPUTER
- [3] [Anonymous], HVC 12
- [4] [Anonymous], P 12 INT C REACH PRO
- [6] Barrett Clark, 2011, Computer Aided Verification. Proceedings 23rd International Conference, CAV 2011, P171, DOI 10.1007/978-3-642-22110-1_14
- [7] NoTamper: Automatic Blackbox Detection of Parameter Tampering Opportunities in Web Applications [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 607 - 618
- [8] Bjorner N, 2009, LECT NOTES COMPUT SC, V5505, P307, DOI 10.1007/978-3-642-00768-2_27
- [9] Z3: An efficient SMT solver [J]. TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 2008, 4963 : 337 - 340
- [10] Emmi M., 2007, ISSTA, P151, DOI DOI 10.1145/1273463.1273484