Author:
Wang Tielei,Song Chengyu,Lee Wenke
Publisher
Springer International Publishing
Reference45 articles.
1. Agrawal, H., Horgan, J.R.: Dynamic program slicing. SIGPLAN Not. 25, 246–256 (1990)
2. Barrett, C., Stump, A., Tinelli, C.: The smt-lib v2 language and tools: A tutorial (February 2011),
www.smtlib.org
3. Bilge, L., Dumitras, T.: Before we knew it: an empirical study of zero-day attacks in the real world. In: CCS (2012)
4. Brumley, D., cker Chiueh, T., Johnson, R., Lin, H., Song, D.: Rich: Automatically protecting against integer-based vulnerabilities. In: NDSS (2007)
5. Brumley, D., Newsome, J., Song, D., Wang, H., Jha, S.: Towards automatic generation of vulnerability signatures. In: IEEE Symposium on Security and Privacy (May 2006)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Neural Transfer Learning for Repairing Security Vulnerabilities in C Code;IEEE Transactions on Software Engineering;2023-01-01
2. Maestro: a platform for benchmarking automatic program repair tools on software vulnerabilities;Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis;2022-07-18
3. Localizing Vulnerabilities Statistically From One Exploit;Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security;2021-05-24
4. Automatic Software Repair;ACM Computing Surveys;2019-01-31
5. IntFlow;Proceedings of the 30th Annual Computer Security Applications Conference;2014-12-08