共 23 条
- [1] Andriantsiferana L., 1997, Formal Description Techniques and Protocol Specification, Testing and Verification. FORTE X/PSTV XVII'97. IFIP TC6 WG6.1 Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols (FORTE X) and Protocol Specification, Testing and Verification (PSTV XVII), P433
- [2] [Anonymous], 2014, INTR TCAS 2 VERS 7 1
- [3] Cabodi G., 2015, WSEAS Transactions on Computers, V14, P760
- [4] Cogswell B., 2007, MICROSOFT ROOTKIT RE
- [5] Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 901 - 913
- [6] Gu RH, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P653
- [7] Using formal methods to develop an ATC information system [J]. IEEE SOFTWARE, 1996, 13 (02) : 66 - 76
- [8] Kim G. H., 1994, 2nd ACM Conference on Computer and Communications Security, P18, DOI 10.1145/191177.191183
- [9] Klein G, 2009, SOSP'09: PROCEEDINGS OF THE TWENTY-SECOND ACM SIGOPS SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, P207
- [10] Petroni NL, 2006, USENIX ASSOCIATION PROCEEDINGS OF THE 15TH USENIX SECURITY SYMPOSIUM, P289