Author:
Wang Pengfei,Lu Kai,Li Gen,Zhou Xu
Publisher
Springer Science and Business Media LLC
Subject
General Computer Science,Theoretical Computer Science
Reference46 articles.
1. Leveson N G, Turner C S. An investigation of the therac-25 accidents. Computer, 1993, 26(7): 18–41
2. Jesdanun A. General electric acknowledges northeastern blackout bug, 2004
3. Net X. Nasdaq CEO blames software design for delayed facebook trading. China Securities Journal, 2012
4. Kasikci B, Zamfir C, Candea G. Data races vs. data race bugs: telling the difference with portend. ACM SIGPLAN Notices, 2012, 47(4): 185–198
5. Huang J, Meredith P O, Rosu G. Maximal sound predictive race detection with control flow abstraction. ACM SIGPLAN Notices, 2014, 49(6): 337–348
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Enhancing IoT Security: A Full-System Simulation Dynamic Taint Analysis Framework for Firmware;2023 3rd International Conference on Electronic Information Engineering and Computer (EIECT);2023-11-17
2. SegFuzz: Segmentizing Thread Interleaving to Discover Kernel Concurrency Bugs through Fuzzing;2023 IEEE Symposium on Security and Privacy (SP);2023-05
3. Defense and Attack Techniques Against File-Based TOCTOU Vulnerabilities: A Systematic Review;IEEE Access;2022
4. Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths;Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security;2021-11-12
5. Atomic Restriction: Hardware Atomization to Defend Against Preemption Attacks;2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom);2020-12