[1] |
LANDWEHR C E , BULL A R , MCDERMOTT J P ,et al. A taxonomy of computer program security flaws[J]. Computing Surveys , 1994,26(3): 211-254.
|
[2] |
WEBER S , KARGER P A , PARADKAR A . A software flaw taxonomy:aiming tools at security[C]// The Workshop on Software Engineering for Secure Systems—Building Trustworthy Applications. 2005: 1-7.
|
[3] |
HUI Z , HUANG S , REN Z ,et al. Review of software security defects taxonomy[C]// The 5th International Conference on Rough Set and Knowledge Technology,Lecture Notes in Computer Science. 2010: 310-321.
|
[4] |
ZHANG B , FENG C , WU B ,et al. Detecting integer overflow in windows binary executables based on symbolic execution[C]// The 17th IEEE/ACIS International Conference on Software Engineering,Artificial Intelligence,Networking and Parallel/Distributed Computing. 2016: 385-390.
|
[5] |
SIDIROGLOU-DOUSKOS S , LAHTINEN ERIC , RITTENHOUSE N ,et al. Targeted automatic integer overflow discovery using goal-directed conditional branch enforcement[C]// The Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems. 2015: 473-486.
|
[6] |
YADEGARI B , STEPHENS J , DEBRAY S . Analysis of exception-based control transfers[C]// The Seventh ACM on Conference on Data and Application Security and Privacy. 2017: 205-216.
|
[7] |
MING J , WU D , WANG J ,et al. StraightTaint:decoupled offline symbolic taint analysis[C]// The 31st IEEE/ACM International Conference on Automated Software Engineering. 2016: 308-319.
|
[8] |
CHA S K , WOO M , BRUMLEY D . Program-adaptive mutational fuzzing[C]// The IEEE Symposium on Security and Privacy. 2015: 725-741.
|
[9] |
PHAM V , B?HME M , ROYCHOUDHURY A . Model-based whitebox fuzzing for program binaries[C]// The 31st IEEE/ACM International Conference on Automated Software Engineering. 2016: 543-553.
|
[10] |
The valgrind developers[EB/OL]. .
|
[11] |
NETHERCOTE N , SEWARD J . Valgrind:a framework for heavyweight dynamic binary instrumentation[J]. ACM SIGPLAN Notices, 2007,42(6): 89-100.
|
[12] |
[EB/OL]. .
|
[13] |
HOLZMANN G J . The model checker SPIN[J]. IEEE Transactions on Software Engineering, 1997,23(5): 279-295.
|
[14] |
BANG K , CHOI J , YOO C . Comments on “the model checker SPIN”[J]. IEEE Transactions on Software Engineering, 2001,27(6): 573-576.
|
[15] |
BRéMOND-GRéGOIRE P , CHOI J , LEE I . A complete axiomatization of finite-state ACSR processes[J]. Information and Computation, 1997,138(2): 124-159.
|
[16] |
The valgrind developers[EB/OL]. .
|
[17] |
The valgrind developers[EB/OL]. .
|