A Data Flow Behavior Constraints Model for Branch Decisionmaking Variables
暂无分享,去创建一个
[1] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[2] David W. Binkley,et al. Interprocedural slicing using dependence graphs , 1990, TOPL.
[3] Daniel Amyot,et al. Recovering behavioral design models from execution traces , 2005, Ninth European Conference on Software Maintenance and Reengineering.
[4] Tao Qin,et al. Discovering use cases from source code using the branch-reserving call graph , 2003, Tenth Asia-Pacific Software Engineering Conference, 2003..
[5] Thomas Reps,et al. Interprocedural slicing using dependence graphs (with retrospective) , 1988, ACM-SIGPLAN Symposium on Programming Language Design and Implementation.
[6] Scott A. Rotondo. Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.
[7] Jun Xu,et al. Non-Control-Data Attacks Are Realistic Threats , 2005, USENIX Security Symposium.
[8] Weibo Gong,et al. Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..