共 9 条
[1]
Amalfitano D, 2012, IEEE INT CONF AUTOM, P258, DOI 10.1145/2351676.2351717
[2]
[Anonymous], 2009, Technical Report CS-TR-4991
[3]
Azim T., 2013, ACM SIGPLAN C OBJ OR
[4]
Chin E., 2011, 9 INT C MOBILE SYSTE, P239, DOI DOI 10.1145/1999995.2000018
[5]
Desnos A., 2011, P BLACK HAT AB DHAB
[6]
An automated approach for identifying potential vulnerabilities in software
[J].
1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS,
1998,
:104-114
[7]
Kim H, 2008, 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, P1304
[8]
Xu GQ, 2008, ICSE'08 PROCEEDINGS OF THE THIRTIETH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, P151, DOI 10.1145/1368088.1368110
[9]
Zheng C., 2012, Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, P93, DOI DOI 10.1145/2381934.2381950