[1]CONTINELLA A,GUAGNELLI A,ZINGARO G,et al.ShieldFS:a self-healing,ransomware-aware filesystem[C]//Proceedings of the 32nd Annual Conference on Computer Security Applications.New York,USA:ACM Press,2016:336-347.
[2]PALISSE A,BOUDER H L,LANET J L,et al.Ransomware and the legacy crypto API[C]//Proceedings of the 11th International Conference on Risks and Security of Internet and Systems.Berlin,Germany:Springer,2017:11-28.
[3]勒索软件这门生意[EB/OL].[2017-07-05].http://www.freebuf.com/column/135307.html.
[4]Wannacry蠕虫勒索软件袭击全球网络[EB/OL].[2017-07-01].http://www.freebuf.com/news/134512.html.
[5]KANSAGRA D,KUHMAR M,JHA D.Ransomware:a threat to cyber-security[J].CS Journals,2016,7(1):224-227.
[6]KHARRAZ A,ARSHAD S,MULLINER C,et al.UNVEIL:a large-scale,automated approach to detecting ransomware[EB/OL].[2017-07-05].http://www.ccs.neu.edu/home/mkharraz/publications/unveil-USENI X.pdf.
[7]LUO X,LIAO Q.Awareness education as the key to ransomware prevention[J].Information Systems Security,2007,16(4):195-202.
[8]MOORE C.Detecting ransomware with HoneyPot Techniques[C]//Proceedings of 2016 Cybersecurity and Cyberforensics Conference.Washington D.C.,USA:IEEE Press,2016:77-81.
[9]KING J C.Symbolic execution and program testing[J].Communications of the ACM,1976,19(7):385-394.
[10]BARRETT C W,SEBASTIANI R,SESHIA S A,et al.Satisfiability modulo theories[J].Handbook of Satisfi-ability,2009,185:825-885.
[11]吉小丽.动态符号执行的性能优化[D].成都:电子科技大学,2013.
[12]GALLAIRE H.Logic programming:future develop-ments[C]//Proceedings of IEEE Symposium on Logic Programming.Washington D.C.,USA:IEEE Press,1985:88-96.
[13]MOURA L D,BJRNER N.Z3:an efficient SMT solver[C]//Proceedings of International Conference on Tools and Algorithms for the Construction and Analysis of Systems.Berlin,Germany:Springer,2008:337-340.
[14]GANESH V,DILL D L.A decision procedure for bit-vectors and arrays[C]//Proceedings of International Conference on Computer Aided Verification.Berlin,Germany:Springer,2007:519-531.
[15]DUTERTRE B,MOURA L D.The yices SMT solver[EB/OL].[2017-07-10].http://gauss.ececs.uc.edu/Courses/c626/lectures/SMT/tool-paper.pdf.
|