共 15 条
[1]
Bosman E, 2011, LECT NOTES COMPUT SC, V6961, P1, DOI 10.1007/978-3-642-23644-0_1
[2]
Bruening D., 2004, Efficient, transparent, and comprehensive runtime code manipulation
[6]
Integer Overflow Vulnerabilities Detection in Software Binary Code
[J].
SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS,
2017,
:101-106
[8]
Kang M.G., 2011, DTA++: Dynamic taint analysis with targeted control-flow propagation