[1] LI Zhen,ZOU Deqing,WANG Zeli.Survey on static software vulnerability detection for source code[J].Chinese Journal of Network and Information Security,2019,5(1):5-18.(in Chinese)李珍,邹德清,王泽丽.面向源代码的软件漏洞静态检测综述[J].网络与信息安全学报,2019,5(1):5-18. [2] HE Liang,SU Purui.Research progress on automatic utilization of software vulnerabilities[J].China Education Network,2016(z1):46-48.(in Chinese)和亮,苏璞睿.软件漏洞自动利用研究进展[J].中国教育网络,2016(z1):46-48. [3] WU Meng.Talking about the research of computer software safety detection technology[J].Digital Technology and Application,2012(12):149-149.(in Chinese)吴蒙.浅谈计算机软件安全检测技术研究[J].数字技术与应用,2012(12):149-149. [4] MILLER C,CABALLERO J,BERKELEY U,et al.Crash analysis with BitBlaze[J].Revista Mexicana de Sociología,2010,44(1):81-117. [5] HEELAN S,KROENING D.Automatic generation of control flow hijacking exploits for software vulnerabilities[D].Oxford,UK:University of Oxford,2009. [6] CHEN Aihong,PENG Weimin.Analysis of the principle and using technology of heap overflow[J].Computer and Digital Engineering,2008,36(9):117-119.(in Chinese)陈爱红,彭伟民.堆溢出原理及利用技术的分析研究[J].计算机与数字工程,2008,36(9):117-119. [7] PEI Zhongyu,ZHANG Chao,DUAN Haixin.Several methods of exploiting Glibc heap[J].Journal of Cyber Security,2018,3(1):1-15.(in Chinese)裴中煜,张超,段海新.Glibc堆利用的若干方法[J].信息安全学报,2018,3(1):1-15. [8] CAO Yaobin,WANG Yagang.An overview of the stack protection techniques in the GCC compiler[J].Information Technology,2017(7):23-25.(in Chinese)曹耀彬,王亚刚.GCC编译器中的堆栈保护技术概述[J].信息技术,2017(7):23-25. [9] SHI Dawei,YUAN Tianwei.A dynamic taint analysis method combined with coarse-grained and fine-grained[J].Computer Engineering,2014,40(3):12-17,22.(in Chinese)史大伟,袁天伟.一种粗细粒度结合的动态污点分析方法[J].计算机工程,2014,40(3):12-17,22. [10] ZHU Zhengxin,ZEENG Fanping,HUANG Xinyi.Dynamic symbolic taint analysis of binary programs[J].Computer Science,2016,43(2):155-158.(in Chinese)朱正欣,曾凡平,黄心依.二进制程序的动态符号化污点分析[J].计算机科学,2016,43(2):155-158. [11] HOWDEN W E.Symbolic testing and the DISSECT symbolic evaluation system[M].Washington D.C.,USA:IEEE Press,1977. [12] ZHAO Yuehua,KAN Junjie.Research and design of test data generation method based on symbolic execution[J].Computer Applications and Software,2014(2):303-306.(in Chinese)赵跃华,阚俊杰.基于符号执行的测试数据生成方法的研究与设计[J].计算机应用与软件,2014(2):303-306. [13] BRUMLUY D,POOSANKAM P,SONG D,et al.Automatic patch-based exploit generation is possible:techniques and implications[C]//Proceedings of IEEE Symposium on Security & Privacy.Washington D.C.,USA:IEEE Press,2008:158-169. [14] AVGERINOS T,SANG K C,HAO B L T,et al.AEG:automatic exploit generation[C]//Proceedings of IEEE Conference on Network and Distributed System Security.Washington D.C.,USA:IEEE Press,2011:668-679. [15] HUANG S K,HUANG M H,HUANG P Y,et al.CRAX:software crash analysis for automatic exploit generation by modeling attacks as symbolic continuations[C]//Proceedings of the 6th IEEE International Conference on Software Security and Reliability.[S.1.]:IEEE Computer Society,2012:78-87. [16] CHIPOUNOV V,KUZNETSOV V,CANDEA G.S2E:a platform for in-vivo multi-path analysis of software systems[J].ACM SIGPLAN Notices,2011,47(4):265-278. [17] CHIPOUNOV V,KUZNETSOV V,CANDEN G.The S2E platform:design,implementation,and applications[M].New York,USA:ACM Press,2012. [18] WANG Xue,LI Xuexin,ZHOU Zhipeng,et al.Analysis of the software testing platform:S2E[J].Netinfo Security,2012(7):16-19.(in Chinese)王学,李学新,周智鹏,等.S2E测试平台及并行性能分析[J].信息网络安全,2012(7):16-19. [19] CADAR C,DUNBAR D,ENGLER D.KLEE:unassisted and automatic generation of high-coverage tests for complex systems programs[C]//Proceedings of USENIX Conference on Operating Systems Design and Implementation.[S.1.]:USENIX Association,2009:209-224. [20] BELLARD F.QEMU,a fast and portable dynamic translator[C]//Proceedings of Annual Conference on USENIX Annual Technical Conference.[S.1.]:USENIX Association,2005:396-411. |