共 17 条
- [1] Li Z., Zhang J., Liao X., Et al., Survey of software vulnerability detection techniques, Journal of Computers, 38, 4, pp. 717-732, (2015)
- [2] Afek J., Sharabani A., Dangling pointer-smashing the pointer for fun and profit, A Whitepaper from Watchfire Citado na, 41, 1, pp. 1-21, (2007)
- [3] Corporation M., Common vulnerabilities and exposures (CVE)
- [4] Daniel M., Honoroff J., Miller C., Engineering heap overflow exploits with JavaScript, USENIX Workshop on Offensive Technologies, pp. 1-6, (2008)
- [5] Sotirov A., Heap feng shui in JavaScript, Black Hat Europe 2013, pp. 1-20, (2013)
- [6] Chess B., McGraw G., Static analysis for security, IEEE Security & Privacy, 2, 6, pp. 76-79, (2004)
- [7] Pistoia M., Chandra S., Fink S.J., Et al., A survey of static analysis methods for identifying security vulnerabilities in software systems, Ibm Systems Journal, 46, 2, pp. 265-288, (2007)
- [8] Bugalyze C.S., com-detecting bugs using decompilation and data flow analysis, Black Hat USA 2013, pp. 1-9, (2013)
- [9] Feist J., Mounier L., Potet M.L., Statically detecting use after free on binary code, Journal of Computer Virology and Hacking Techniques, 10, 3, pp. 211-217, (2014)
- [10] Dewey D., Reaves B., Traynor P., Uncovering use-after-free conditions in compiled code, 2015 10th International Conference on Availability, Reliability and Security, pp. 90-99, (2015)