共 17 条
[1]
[Anonymous], 2013, IBM RATIONAL APPSCAN
[2]
[Anonymous], 2013, FORTIFY 360 SOURCE C
[3]
[Anonymous], 2011, USENIX SEC S
[4]
[Anonymous], 2012, TRUST TRUSTWORTHY CO
[5]
[Anonymous], 2012, SPSM 12 P WORKSHOP S
[6]
Arzt S., 2013, SUSI TOOL FULLY AUT
[7]
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2594291.2594299, 10.1145/2666356.2594299]
[8]
Batyuk L., 2011, 2011 6th International Conference on Malicious and Unwanted Software, P66, DOI 10.1109/MALWARE.2011.6112328
[9]
Chin E, 2011, Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys '11, New York, NY, USA, P239, DOI DOI 10.1145/1999995.2000018
[10]
Enck William., 2010, Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), P393