[1] LI Zhoujun,ZHANG Junxian,LIAO Xiangke,et al.Software security vulnerability detection technology[J].Chinese Journal of Computers,2015,38(4):717-732.(in Chinese)李舟军,张俊贤,廖湘科,等.软件安全漏洞检测技术[J].计算机学报,2015,38(4):717-732. [2] CADAR C,DUNBAR D,ENGLER D.KLEE:unassisted and automatic generation of high-coverage tests for complex systems programs[C]//Proceedings of the 8th USENIX Sysposium on Operating Systems Design and Implementation.San Diego,USA:ISOC Press,2008:209-224. [3] GODEFROID P,LEVIN M,MOLNAR D.SAGE:whitebox fuzzing for security testing[J].ACM Queue,2012,10(1):20. [4] RAMOS D,ENGLER D.Under-constrained symbolic execution:correctness checking for real code[C]//Proceedings of the 24th USENIX Security Symposium.San Diego,USA:USENIX Association,2015:49-64. [5] STEPHENS N,GROSEN J,SALLS C,et al.Driller:aug-menting fuzzing through selective symbolic execution[C]//Proceedings of ISOC Network and Distributed System Security Symposium.San Diego,USA:ISOC Press,2016:1-16. [6] LEI Xue.Research on key technologies of Concolic test[D].Beijing:Beijing University of Posts and Telecommunications,2016.(in Chinese)雷雪.Concolic测试关键技术研究[D].北京:北京邮电大学,2016. [7] CIH(computer virus)[EB/OL].[2018-12-30].https://baike.baidu.com/item/CIH%E7%97%85%E6%AF%92/221488?fromtitle=CIH&fromid=963860. [8] VITALY C,VOLODYMYR K,GEORGE C.S2E:a platform forln-vivo mxxlti-path analysis of software systems[C]//Proceedings of the 16th International Conference on Architectural Support for Programming Languages and Operating Systems.New York,USA:ACM Press,2011:265-278. [9] KASPER L,MARKO D,DIMITRA G,et al.JDart:a dynamic symbolic analysis framework[C]//Proceedings of the 22nd International Confercence on Tools and Algorithms for the Construction and Analysis of Systems.Berlin,Germany:Springer,2016:442-459. [10] KIM T,PARK J,KULIDA K,et al.Concolic testing framework for industrial embedded software[C]//Proceedings of the 21st Asia-Pacific Software Engineering Conference.Washington D.C.,USA:IEEE Press,2014:7-10. [11] YAO Chi,WANG Yawei,LI Feng,et al.A method of function modeling in accurate stub generation[C]//Proceedings of the 2nd International Conference on Systems and Informatics.Shanghai,China:[s.n.],2016:1022-1026. [12] RAWAT S,JAIN V,KUMAR A,et al.VUzzer:application aware evolutionary fuzzing[C]//Proceedings of the ISOC Network and Distributed System Security Symposium.San Diego,USA:Internet Society,2017:20-32. [13] FAN Wenqing,XUE Lei,AN Jing.Obfuscated malicious code detection with path condition analysis[J].Journal of Networks,2014,9(5):1208-1214. [14] X86 calling conventions[EB/OL].[2018-12-30].https://en.wikipedia.org/wiki/x86_calling_conventions. [15] WANG Weiguang,ZENG Qingkai,SUN Hao.Dynamic symbolic execution method oriented to critical operation[J].Journal of Software,2016,27(5):1230-1245.(in Chinese)王伟光,曾庆凯,孙浩.面向危险操作的动态符号执行方法[J].软件学报,2016,27(5):1230-1245. [16] LI Ya,HUANG Shaobin,LI Yanmei,et al.Technique of software fault localization based on weakest pre-condition[J].Acta Electronica Sinica,2019,47(1):25-32.(in Chinese)李雅,黄少滨,李艳梅,等.一种基于最弱前置条件的软件错误定位算法[J].电子学报,2019,47(1):25-32. [17] WANG Lei.Research and implementation of path search strategy in dynamic symbol execution[D].Xi'an:Xidian University,2017.(in Chinese)王磊.动态符号执行中路径搜索策略的研究与实现[D].西安:西安电子科技大学,2017. [18] Open source China[EB/OL].[2018-12-30].https://www.oschina.net.(in Chinese)开源中国[EB/OL].[2018-12-30].https://www.oschina.net. [19] JANA S,KANG Y,ROTH S,et al.Automatically detecting error handling bugs using error specifications[C]//Proceedings of the 16th USENIX Sysposium on Operating Systems Design and Implementation.Berkeley,USA:USENIX Association,2016:345-362. |