共 29 条
[1]
Amit D, 2007, LECT NOTES COMPUT SC, V4590, P477
[2]
[Anonymous], 1977, POPL
[4]
Automatic patch-based exploit generation is possible: Techniques and implications
[J].
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2008,
:143-+
[5]
Cadar C., 2008, Proceedings of the 8th USENIX conference on Operating systems design and implementation, OSDI'08, (USA), P209
[6]
Chaki S, 2012, LECT NOTES COMPUT SC, V7148, P119, DOI 10.1007/978-3-642-27940-9_9
[7]
Clarke E, 2003, ASP-DAC 2003: PROCEEDINGS OF THE ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, P308, DOI 10.1109/ASPDAC.2003.1195033
[8]
Cousot P., 1978, 5 ANN ACM S POPL 78, P84, DOI [DOI 10.1145/512760.512770, 10.1145/512760.512770]
[9]
Godlin B, 2009, DES AUT CON, P466