共 14 条
- [1] Abdulla PA, 2014, LECT NOTES COMPUT SC, V8559, P150, DOI 10.1007/978-3-319-08867-9_10
- [2] [Anonymous], 2010, NDSS
- [3] Bjorner N., 2013, EPIC SERIES, V20, P77
- [4] Griggio A., 2012, Journal on Satisfiability, Boolean Modeling and Computation, V8, P1
- [5] Kausler Scott., 2014, Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering, ASE '14, P259
- [6] Kiezun A, 2009, ISSTA 2009: INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, P105
- [7] Liang TY, 2014, LECT NOTES COMPUT SC, V8559, P646, DOI 10.1007/978-3-319-08867-9_43
- [8] S3: A Symbolic String Solver for Vulnerability Detection in Web Applications [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1232 - 1243
- [9] Moller A., 2010, DK BRICS AUTOMATON F