共 50 条
- [2] Dynamic and static analyses of integer overflow vulnerabilities [J]. Wen, Jiangtao, 1600, Tsinghua University (54):
- [5] Detecting integer overflow vulnerabilities in binary executables based on Target filtering and dynamic taint tracing [J]. 1600, Chinese Institute of Electronics (23):
- [6] Mutation-based Testing of Integer Overflow Vulnerabilities [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4416 - 4419
- [7] Memory Corruption Vulnerabilities Detection for Android Binary Software [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2015, : 16 - 20
- [8] A methodology for the automated identification of buffer overflow vulnerabilities in executable software without source-code [J]. DEPENDABLE COMPUTING, PROCEEDINGS, 2005, 3747 : 20 - 34
- [9] Deep Learning for Software Vulnerabilities Detection Using Code Metrics [J]. IEEE ACCESS, 2020, 8 : 74562 - 74570
- [10] Integer squarers with overflow detection [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2008, 34 (05) : 378 - 391