共 50 条
- [14] TEEREX: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 841 - 858
- [15] On the Detection and Analysis of Software Security Vulnerabilities 2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,
- [16] Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 432 - 439
- [18] Profiling Android Vulnerabilities 2016 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2016), 2016, : 222 - 229
- [19] Android Vulnerabilities and Security 2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 204 - 208
- [20] Statically Detect Invalid Pointer Dereference Vulnerabilities in Binary Software PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATCS AND COMPUTING (IEEE PIC), 2015, : 390 - 394