Frankencode: Creating Diverse Programs Using Code Clones
暂无分享,去创建一个
Mark S. Boddy | Hayley Borck | Steven A. Harp | Steven Johnston | August Schwerdfeger | Mary Southern | Ian J. De Silva | Ken Hoyme
[1] Zhendong Su,et al. Automatic mining of functionally equivalent code fragments via random testing , 2009, ISSTA.
[2] Michael D. Ernst,et al. Dynamically discovering likely program invariants , 2000 .
[3] Alessandra Gorla,et al. Cross-checking oracles from intrinsic software redundancy , 2014, ICSE.
[4] Michael Franz,et al. Runtime Defense against Code Injection Attacks Using Replicated Execution , 2011, IEEE Transactions on Dependable and Secure Computing.
[5] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[6] Alessandra Gorla,et al. Search-based synthesis of equivalent method sequences , 2014, SIGSOFT FSE.
[7] Chanchal K. Roy,et al. A Survey on Software Clone Detection Research , 2007 .
[8] Mauro Pezzè,et al. Measuring Software Redundancy , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[9] Heejung Kim,et al. MeCC: memory comparison-based clone detector , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[10] Jack W. Davidson,et al. Security through redundant data diversity , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[11] Per Larsen,et al. Security through Diversity: Are We There Yet? , 2014, IEEE Security & Privacy.