Author:
Fu Yeqi,Liu Yongzhi,Zhang Qian,Yang Zhou,Chen Xiarun,Xie Chenglin,Wen Weiping
Publisher
Springer Nature Singapore
Reference20 articles.
1. CVE Details (2022). https://www.cvedetails.com/
2. Ahmadi, M., Farkhani, R.M., Williams, R., Lu, L.: Finding bugs using your own code: detecting functionally-similar yet inconsistent code. In: USENIX Security Symposium, pp. 2025–2040. USENIX Association (2021)
3. Akritidis, P., Cadar, C., Raiciu, C., Costa, M., Castro, M.: Preventing memory error exploits with WIT. In: 2008 IEEE Symposium on Security and Privacy (S &P 2008), 18–21 May 2008, Oakland, California, USA, pp. 263–277. IEEE Computer Society (2008). https://doi.org/10.1109/SP.2008.30
4. Bletsch, T., Jiang, X., Freeh, V.: Mitigating code-reuse attacks with control-flow locking. In: Proceedings of the 27th Annual Computer Security Applications Conference, pp. 353–362. Association for Computing Machinery (2011). https://doi.org/10.1145/2076732.2076783
5. Chen, X., et al.: VulChecker: achieving more effective taint analysis by identifying sanitizers automatically. In: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 774–782. IEEE (2021). https://doi.org/10.1109/TrustCom53373.2021.00112