CORC

浏览/检索结果: 共38条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Inferring Patterns for Taint-Style Vulnerabilities With Security Patches 期刊论文
IEEE ACCESS, 2019, 卷号: Vol.7, 页码: 52339-52349
作者:  Song, T.a;  Li, X.a;  Feng, Z.b;  Xu, G.a
收藏  |  浏览/下载:3/0  |  提交时间:2019/11/21
Tell you a Definite Answer: Whether Your Data is Tainted During Thread Scheduling 期刊论文
IEEE Transactions on Software Engineering, 2018
作者:  Zhang, Xiaodong;  Yang, Zijiang
收藏  |  浏览/下载:8/0  |  提交时间:2019/11/19
Accurate and efficient exploit capture and classification 期刊论文
Science China. Information Science, 2017
Ding Yu; Wei Tao; Xue Hui; Zhang Yulong; Zhang Chao; Han Xinhui
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
Accurate and efficient exploit capture and classification 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2017
Ding, Yu; Wei, Tao; Xue, Hui; Zhang, Yulong; Zhang, Chao; Han, Xinhui
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
基于敏感字符的SQL注入攻击防御方法 期刊论文
计算机研究与发展, 2016
张慧琳; 丁羽; 张利华; 段镭; 张超; 韦韬; 李冠成; 韩心慧
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
Dytaint: The implementation of a novel lightweight 3-state dynamic taint analysis framework for x86 binary programs 期刊论文
Computers and Security, 2015, 卷号: Vol.52, 页码: 51-69
作者:  Li,Xuejian;  Liu,Feng;  Liang,Alei;  Zhu,Erzhou;  Li,Xuejun
收藏  |  浏览/下载:7/0  |  提交时间:2019/04/22
MonkeyDroid: Detecting Unreasonable Privacy Leakages of Android Applications 期刊论文
NEURAL INFORMATION PROCESSING, PT III, 2015, 卷号: 9491, 页码: 384-391
作者:  Ma, Kai;  Liu, Mengyang;  Guo, Shanqing;  Ban, Tao
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/17
CoChecker: Detecting capability and sensitive data leaks from component chains in android 其他
2014-01-01
Cui, Xingmin; Yu, Da; Chan, Patrick; Hui, Lucas C.K.; Yiu, S.M.; Qing, Sihan
收藏  |  浏览/下载:2/0  |  提交时间:2015/11/17
模糊测试应用于二进制程序的漏洞发现方法研究 学位论文
2014, 2014
刘丙昌
收藏  |  浏览/下载:3/0  |  提交时间:2016/01/12
Statically-directed dynamic taint analysis 期刊论文
Chinese Journal of Electronics, 2014, 卷号: 23, 期号: 1, 页码: 18-24
Chen, Kai (1); Zhang, Yingjun (2)
收藏  |  浏览/下载:13/0  |  提交时间:2014/12/16


©版权所有 ©2017 CSpace - Powered by CSpace