Author:
Huang Jintao,Wang Gaosheng,Shi Zhiqiang,Lv Fei,Zhang Weidong,Lv Shichao
Publisher
Springer Nature Singapore
Reference34 articles.
1. Synopsys, I.: 2022 open source security and analysis report (2022). https://www.synopsys.com/software-integrity/resources/analyst-reports/open-source-security-risk-analysis.html. Accessed 15 Apr 2022
2. Jang, J., Agrawal, A., Brumley, D.: Redebug: finding unpatched code clones in entire OS distributions. In: IEEE Symposium on Security and Privacy, pp. 48–62. IEEE (2012)
3. Kim, S., Woo, S., Lee, H., Oh, H.: Vuddy: a scalable approach for vulnerable code clone discovery. In: IEEE Symposium on Security and Privacy (SP), pp. 595–614. IEEE (2017)
4. Li, Z., Zou, D., Xu, S., Jin, H., Qi, H., Hu, J.: Vulpecker: an automated vulnerability detection system based on code similarity analysis. In: Proceedings of the 32nd Annual Conference on Computer Security Applications, pp. 201–213 (2016)
5. Synopsys, I.: The heartbleed bug (2020). https://heartbleed.com/. Accessed 8 Apr 2022