共 50 条
- [41] A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes International Journal of Information Security, 2023, 22 : 1277 - 1290
- [43] A Survey Paper on Vulnerabilities in Android OS and Security of Android Devices 2014 IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN), 2014, : 174 - 178
- [45] Two Vulnerabilities in Android OS Kernel 2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013, : 6123 - 6127
- [46] Colluded Applications Vulnerabilities in Android Devices 2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 462 - 469
- [47] Android Code Vulnerabilities Early Detection Using AI-Powered ACVED Plugin DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVII, DBSEC 2023, 2023, 13942 : 339 - 357
- [49] Two-Level Algebraic Method for Detection of Vulnerabilities in Binary Code PROCEEDINGS OF THE 2019 10TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS - TECHNOLOGY AND APPLICATIONS (IDAACS), VOL. 2, 2019, : 1074 - 1077