共 50 条
- [31] Automatic source code generation of peripheral hardware modules firmware [J]. 2013 21ST TELECOMMUNICATIONS FORUM (TELFOR), 2013, : 833 - +
- [32] Hardware-assisted fine-grained code-reuse attack detection [J]. (1) State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China; (2) Department of Computer Science and Technology, Nanjing University, Nanjing, China; (3) School of Information Systems, Singapore Management University, Singapore, Singapore, 1600, Asterisk Research, Inc.; Deloitte Tohmatsu Risk Services Co., Ltd.; Farsight Security, Inc.; NTT Communications Corporation; Tapad Inc. (Springer Verlag):
- [34] On the adoption and effects of source code reuse on defect proneness and maintenance effort [J]. Empirical Software Engineering, 2024, 29
- [35] The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software [J]. 2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2022), 2022, : 2104 - 2115
- [37] Reusable Execution Replay: Execution Record and Replay for Source Code Reuse [J]. 36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE COMPANION 2014), 2014, : 480 - 483
- [38] Extraction of Library Update History Using Source Code Reuse Detection [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (03): : 799 - 802
- [40] Source Code Reuse Evaluation by Using Real/Potential Copy and Paste [J]. 2015 IEEE 9TH INTERNATIONAL WORKSHOP ON SOFTWARE CLONES (IWSC), 2015, : 33 - 39