共 50 条
[31]
Symbolic execution based feature extraction for detection of malware
[J].
PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020),
2020,
[32]
An Automatic Exploit Generation Method Based on Symbolic Execution
[J].
2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018),
2018,
:437-440
[33]
Automated Test Generation on Path-based Symbolic Execution
[J].
2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS),
2014,
:845-848
[34]
Distributed CFG-based Symbolic Execution for Assembly Programs
[J].
2015 IEEE 4TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE),
2015,
:76-80
[35]
Test Case Selection based on Path Condtions of Symbolic Execution
[J].
2012 19TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC), VOL 1,
2012,
:318-321
[36]
Smart Contract Vulnerability Detection Based on Symbolic Execution Technology
[J].
CYBER SECURITY, CNCERT 2021,
2022, 1506
:193-207
[37]
Improving the Accuracy of Static Defect Analysis Based on Symbolic Execution
[J].
Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology,
2020, 40 (04)
:382-385and395
[38]
FlawCheck: Detecting Smart Contract Vulnerabilities Based on Symbolic Execution
[J].
SECURITY AND PRIVACY,
2025, 8 (02)
[39]
Similar Execution Path Generation Based on Backward Symbolic Analysis
[J].
MODERN TENDENCIES IN ENGINEERING SCIENCES,
2014, 533
:427-431
[40]
Patch-Related Vulnerability Detection Based on Symbolic Execution
[J].
IEEE ACCESS,
2017, 5
:20777-20784