共 13 条
- [1] Miller C., Caballero J., Berkeley U., Et al., Crash analysis with BitBlaze, Revista Mexicana De Sociología, 44, 1, pp. 81-117, (2010)
- [2] Heelan S., Automatic generation of control flow hijacking exploits for software vulnerabilities, (2009)
- [3] He L., Su P., Research progress on automatic exploitation of software vulnerabilities, China Education Network, 2, pp. 46-48, (2016)
- [4] Avgerinos T., Sang K.C., Hao B.L.T., Et al., AEG: automatic exploit generation, Internet Society, 57, 2, pp. 1-18, (2011)
- [5] Huang S.K., Huang M.H., Huang P.Y., Et al., CRAX: software crash analysis for automatic exploit generation by modeling attacks as symbolic continuations, Proceedings of IEEE the Sixth International Conference on Software Security and Reliability, pp. 78-87, (2012)
- [6] Chipounov V., Kuznetsov V., Candea G., S2E: a platform for in-vivo multi-path analysis of software systems, ACM SIGPLAN Notices, 46, 3, pp. 265-278, (2011)
- [7] Chipounov V., Kuznetsov V., Candea G., The S2E platform: design, implementation, and applications, ACM Transactions on Computer Systems, 30, 1, pp. 2/1-2/49, (2012)
- [8] Wang M., Su P., Li Q., Et al., Automatic polymorphic exploit generation for software vulnerabilities, Proceedings of International Conference on Security and Privacy in Communication Systems, pp. 216-233, (2013)
- [9] Von Hagen W., Building and installing Glibc, The Definitive Guide to GCC, pp. 247-279, (2006)
- [10] Huang H., Lu Y., Liu L., Et al., A research on control-flow taint information directed symbolic execution, Journal of University of Science and Technology of China, 46, 1, pp. 21-27, (2016)