暂无分享,去创建一个
[1] Charles V. Wright,et al. Crypto Crumple Zones: Enabling Limited Access without Mass Surveillance , 2018, 2018 IEEE European Symposium on Security and Privacy (EuroS&P).
[2] Eric Rescorla,et al. Is finding security holes a good idea? , 2005, IEEE Security & Privacy.
[3] Vern Paxson,et al. A Large-Scale Empirical Study of Security Patches , 2017, CCS.
[4] Matt Blaze,et al. Protocol failure in the escrowed encryption standard , 1994, CCS '94.
[5] Воробьев Антон Александрович. Анализ уязвимостей вычислительных систем на основе алгебраических структур и потоков данных National Vulnerability Database , 2013 .
[6] Laurie A. Williams,et al. Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities , 2011, IEEE Transactions on Software Engineering.
[7] Anas N. Al-Rabadi,et al. A comparison of modified reconstructability analysis and Ashenhurst‐Curtis decomposition of Boolean functions , 2004 .
[8] Mira Mezini,et al. "Jumping Through Hoops": Why do Java Developers Struggle with Cryptography APIs? , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).
[9] Stuart E. Schechter,et al. Milk or Wine: Does Software Security Improve with Age? , 2006, USENIX Security Symposium.
[10] Matthew Green,et al. Keys under doormats , 2015, J. Cybersecur..
[11] Vern Paxson,et al. The Matter of Heartbleed , 2014, Internet Measurement Conference.
[12] Mira Mezini,et al. CogniCrypt: Supporting developers in using cryptography , 2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[13] Stefan Savage,et al. Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion , 2018, CCS.
[14] Xi Wang,et al. Why does cryptographic software fail?: a case study and open problems , 2014, APSys.
[15] Muhammad Zubair Shafiq,et al. A large scale exploratory analysis of software vulnerability life cycles , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[16] Pierre Laperdrix,et al. Less is More: Quantifying the Security Benefits of Debloating Web Applications , 2019, USENIX Security Symposium.
[17] James Walden,et al. The Impact of a Major Security Event on an Open Source Project: The Case of OpenSSL , 2020, 2020 IEEE/ACM 17th International Conference on Mining Software Repositories (MSR).
[18] Laurie A. Williams,et al. Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista , 2010, 2010 Third International Conference on Software Testing, Verification and Validation.
[19] Simson L. Garfinkel,et al. Comparing the Usability of Cryptographic APIs , 2017, 2017 IEEE Symposium on Security and Privacy (SP).