共 50 条
[42]
Smart Contract Vulnerability Detection Based on Symbolic Execution Technology
[J].
CYBER SECURITY, CNCERT 2021,
2022, 1506
:193-207
[43]
Test Case Selection based on Path Condtions of Symbolic Execution
[J].
2012 19TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC), VOL 1,
2012,
:318-321
[44]
Similar Execution Path Generation Based on Backward Symbolic Analysis
[J].
MODERN TENDENCIES IN ENGINEERING SCIENCES,
2014, 533
:427-431
[45]
Patch-Related Vulnerability Detection Based on Symbolic Execution
[J].
IEEE ACCESS,
2017, 5
:20777-20784
[46]
Trustworthy Scheduling based on Constraint Solving Scheme
[J].
ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2,
2009,
:1305-1307
[47]
Configuration of Domotic Systems based on Constraint Solving
[J].
26TH ACM INTERNATIONAL SYSTEMS AND SOFTWARE PRODUCT LINE CONFERENCE, SPLC 2022, VOL B,
2022,
:145-149
[49]
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes
[J].
International Journal of Information Security,
2023, 22
:1277-1290
[50]
A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes
[J].
TESTS AND PROOFS (TAP 2022),
2022, 13361
:89-105