[1] |
ZHOU L, NIU X, ZHAO S, et al.Research on Congestion Rate of Classified Storage Narrow Channel Picking System for IoT Security[J/OL].[2020-07-26].https://link.springer.com/article/10.1007/s11276-020-02372-6.
|
[2] |
毕梦格, 巨玉, 侯蓉晖. 一种环境自适应的卫星网络安全路由协议[J]. 西安电子科技大学学报, 2020,47(1):66-72.
|
|
BI Mengge, JU Yu, HOU Ronghui. Environmentally-adaptive Secure Routing Protocol for Satellite Networks[J]. Journal of Xidian University, 2020,47(1):66-72.
|
[3] |
NVD.CVE-2019-2215[EB/OL].[2020-07-17] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2215.
|
[4] |
史翠红. 嵌入式汇编程序静态分析研究[J]. 航天返回与遥感, 2008,29(1):59-62.
|
|
SHI Cuihong. Static Analysis for Embedded Assembly Program[J]. Spacecraft Recovery & Remote Sensing, 2008,29(1):59-62.
|
[5] |
CERDEIRA D, SANTOS N, FONSECA P, et al. SoK:Understanding the Prevailing Security Vulnerabilities in Trust Zone-assisted TEE Systems [C]//Proceedings of the 2020 IEEE Symposium on Security and Privacy.Piscataway:IEEE, 2020: 1416-1432.
|
[6] |
侯成杰. 航天器C语言软件常见编程错误分析及检测方法研究[J]. 空间控制技术与应用, 2013,39(6):53-57.
|
|
HOU Chengjie. On Common Programming Errors of Spacecraft Software in C Language and Their Checking Methods[J]. Aerospace Control and Application, 2013,39(6):53-57.
|
[7] |
王志强, 张玉清, 刘奇旭, 等. 一种简单网络管理协议漏洞挖掘算法[J]. 西安电子科技大学学报, 2015,42(4):20-26.
|
|
WANG Zhiqiang, ZHANG Yuqing, LIU Qixu, et al. Algorithm for Discovering SNMP Protocol Vulnerability[J]. Journal of Xidian University, 2015,42(4):20-26.
|
[8] |
SEREBRYANY K, BRUENING D, POTAPENKO A, et al. Address Sanitizer:a Fast Address Sanity Checker [C]//Proceedings of the 2012 USENIX Annual Technical Conference.Berkeley:USENIX Association, 2019: 309-318.
|
[9] |
VANDER KOUWE E, NIGADE V, GIUFFRIDA C. DangSan:Scalable Use-after-free Detection [C]//Proceedings of the 2017 12th European Conference on Computer Systems.New York:ACM, 2017: 405-419.
|
[10] |
NETHERCOTE N, SEWARD J. Valgrind:a Program Supervision Framework[J]. Electronic Notes in Theoretical Computer Science, 2003,89(2):44-66.
|
[11] |
BEKRAR S, BEKRAR C, GROZ R, et al. Finding Software Vulnerabilities by Smart Fuzzing [C]//Proceedings of the 2011 4th IEEE International Conference on Software Testing,Verification,and Validation.Washington:IEEE Computer Society, 2011: 427-430.
|
[12] |
Lcamtuf.American Fuzzy Lop (2.52b)[EB/OL].[2020-07-17] https://lcamtuf.coredump.cx/afl/.
|
[13] |
YAN H, SUI Y, CHEN S, et al. Spatio-Temporal Context Reduction:A Pointer-analysis-based Static Approach for Detecting Use-after-free Vulnerabilities [C]//Proceedings of the 2018 40th International Conference on Software Engineering.New York:ACM, 2018: 327-337.
|
[14] |
BAI J J, LAWALL J, CHEN Q L, et al. Effective Static Analysis of Concurrency Use-after-free Bugs in Linux Device Drivers [C]//Proceedings of the 2019 USENIX Annual Technical Conference.Berkeley:USENIX Association, 2019: 255-268.
|
[15] |
韩心慧, 魏爽, 叶佳奕, 等. 二进制程序中的use-after-free漏洞检测技术[J]. 清华大学学报(自然科学版), 2017,57(10):1022-1029.
|
|
HAN Xinhui, WEI Shuang, YE Jiayi, et al. Detect Use-after-free Vulnerabilities in Binaries[J]. Journal of Tsinghua University (Science and Technology), 2017,57(10):1022-1029.
|
[16] |
CHIPOUNOV V, KUZNETSOV V, CANDEA G, et al. S2E:a Platform for In-vivo Multi-path Analysis of Software Systems [C]//Proceedings of 2011 the International Conference on Architectural Support for Programming Languages and Operating Systems.New York:ACM, 2011,46(3):265-278.
|
[17] |
NVD.CVE-2016-7910[EB/OL].[2020-07-17] .https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7910.
|
[18] |
NVD.CVE-2016-6309[EB/OL].[2020-07-17].https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6309.
|