Author:
Guo Haoyu,Zhang Xiaodong,Zhang Zhiwei,Shen Yulong
Publisher
Springer Nature Switzerland
Reference38 articles.
1. Li, Z., et al.: Vulpecker: an automated vulnerability detection system based on code similarity analysis. In: Proceedings of the 32nd Annual Conference on Computer Security Applications (2016)
2. Kim, S., et al.: Vuddy: a scalable approach for vulnerable code clone discovery. In: 2017 IEEE Symposium on Security and Privacy (SP). IEEE (2017)
3. Wheeler, D.A.: Flawfinder (2016). https://www.dwheeler.com/flawfinder/. Accessed 20 May 2018
4. Sutton, M., Greene, A., Amini, P.: Fuzzing: Brute Force Vulnerability Discovery. Pearson Education, London (2007)
5. Newsome, J., Song, D.X.: Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software. In: NDSS, vol. 5 (2005)