1 |
赵鑫 . 漏洞攻击防范技术与漏洞数据库设计. 北京邮电大学硕士研究生学位论文, 2008
|
2 |
王颖, 李祥和 . 软件漏洞的分类研究. 计算机系统应用, 2008(11)
|
3 |
Common vulnerabilities and exposures(CVE),
|
4 |
|
5 |
|
6 |
Jones R J . Microsoft Vista vs Windows XP SP2 vulnerability report 2007,
|
7 |
Sotirov A . Automatic vulnerability detection using static source code analysis. Graduate Paper of the University of Alabama, 2005
|
8 |
Newsome J , Dawn S . Dynamic taint analysis for automatic detection,analysis,and signature generation of exploits on commodity software.In: Network and Distributed System Security Symposium (NDSS), San Diego, July 2005
|
9 |
Venkataramani G , Doudalis I , Solihin Y , et al . FlexiTaint:a programmable accelerator for dynamic taint propagation.In: 14th IEEE International Symposium on High-Performance Computer Architecture(HPCA), Salt Lake City, Feb 2008
|
10 |
Chabbi M M . Efficient taint analysis using multicore machines. Graduate Paper of the University of Arizona, 2007
|
11 |
Choi Y H , Kim H C , Oh H G , et al . Call-flow aware API Fuzz testing for security of windows systems.In: International Conference on Computer Science and Applications(ICCSA)2008, Perugia,Italy, June 2008
|
12 |
王清 . 0-day安全:软件漏洞分析技术. 北京: 电子工业出版社, 2008
|
13 |
王嘉捷 . 基于软件补丁的漏洞自动挖掘研究. 2008年中国信息安全漏洞分析与风险评估研讨会, 北京, 2014年12月
|
14 |
Xee . MS08-025 win32k. sys NtUserFnOutString privilege escalation exploit.
|
15 |
方兴 . 无所不在的攻击与利用. 2008年中国信息安全漏洞分析
|
16 |
Peterson C . Windows 7安全纵览. XCon2008, 北京, 2008年12月
|
17 |
Jones R J . 2008 desktop OS vendor report.
|
18 |
Aggarwal A , Jalote P . Integrating static and dynamic analysis for detecting vulnerabilities.In: 30th Annual International Computer Software and Applications Conference, Chicago, September 2006
|
19 |
Du Wenliang , Mathur P A . Vulnerability testing of software system using fault injection. Technical Report Coast TR98-02, Department of Computer Science,Purdue University, April 1998
|
20 |
Sparks S , Embleton S , Cunningham R , et al . Automated vulnerability analysis:leveraging control flow for evolutionary input crafting.In: 23rd Annual Computer Security Applications Conference, Florida,USA, December 2007
|
21 |
Choi Y H , Kim H C , Lee D H . An empirical study for security of windows DLL files using automated API Fuzz testing.In: International Conference on Advanced Computing Technologies(ICACT), Hyderadad, Feb 2008
|