共 65 条
[1]
Abrath B., 2016, P 6 WORKSH SOFTW SEC
[2]
Ahmadvand M, 2019, ADV COMPUT, V112
[3]
Anckaert B, 2007, QOP'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON QUALITY OF PROTECTION, P15
[4]
[Anonymous], 2007, 1 FORUM INCIDENT RES
[5]
[Anonymous], 1999, 2 WORKSH RES SEC VUL
[6]
Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
[7]
Basile C, 2016, FP7 ASPIRE EU
[9]
Automatic discovery of software attacks via backward reasoning
[J].
2015 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON SOFTWARE PROTECTION (SPRO),
2015,
:52-58
[10]
Biham E., 1993, Differ. Cryptanal. Data Encrypt. Stand., DOI DOI 10.1007/978-1-4613-9314-6