×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [13]
北京航空航天大学 [10]
北京大学 [7]
西安交通大学 [6]
清华大学 [4]
武汉大学 [4]
更多...
内容类型
会议论文 [25]
期刊论文 [22]
其他 [5]
学位论文 [5]
科研项目 [1]
发表日期
2019 [1]
2018 [4]
2017 [6]
2016 [10]
2015 [2]
2014 [4]
更多...
学科主题
Computer S... [1]
Computer S... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共58条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Symac: Symbolic execution augmented with concurrent coverage criteria
会议论文
2nd International Conference on Computer Science and Software Engineering, CSSE 2019, Xi'an, China, 2019-05-24
作者:
Zhou, Yong
;
Zhang, Li
;
Li, Haoyu
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/02
Tell you a Definite Answer: Whether Your Data is Tainted During Thread Scheduling
期刊论文
IEEE Transactions on Software Engineering, 2018
作者:
Zhang, Xiaodong
;
Yang, Zijiang
;
Zheng, Qinghua
;
Hao, Yu
;
Liu, Pei
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/11/19
Encoding
Guided Execution
Instruction sets
Monitoring
Multithreaded Programs
Prototypes
Schedules
Security
Symbolic Analysis
Taint Analysis
Tools
Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces
会议论文
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018-01-01
作者:
Yuan, Ming
;
Li, Ye
;
Li, Zhoujun
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/30
Firmware
Authentication-bypassing URLs
Symbolic execution
Lightweight dynamic data tracker
Automatic exploit generation
Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization
会议论文
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018-01-01
作者:
Liang, Mingyue
;
Li, Zhoujun
;
Zeng, Qiang
;
Fang, Zhejun
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Deobfuscation
Virtualization obfuscation
Symbolic execution
Compilation optimization
Hijacking your routers via control-hijacking URLs in embedded devices with web interfaces
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 10631 LNCS, 页码: 363-373
作者:
Yuan, M.
;
Li, Y.
;
Li, Z.
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
Authentication
Firmware
Routers
Websites
Authentication mechanisms
Automatic exploit generation
Control hijackings
Dynamic data
Potential attack
Safety considerations
Symbolic execution
User management
Web services
Locating Software Faults Based on Minimum Debugging Frontier Set
期刊论文
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2017, 卷号: 43, 期号: 8, 页码: 760-776
作者:
Li, Feng
;
Li, Zhiyuan
;
Huo, Wei
;
Feng, Xiaobing
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2019/12/12
Fault localization
minimum debugging frontier set
sparse symbolic exploration
dynamic dependence graph
A Branch History Directed Heuristic Search for Effective Binary Level Dynamic Symbolic Execution
期刊论文
IEEE ACCESS, 2017, 卷号: 5, 页码: 8752-8762
作者:
Hu, Yan
;
Kong, Weiqiang
;
Ren, Yizhi
;
Choo, Kim-Kwang Raymond
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/02
Dynamic symbolic execution
branch history
test case generation
heuristic search
cyber-physical system
Debugging multithreaded programs using symbolic analysis
会议论文
作者:
Zhang, Xiaodong
;
Liu, Ting
;
Yang, Zijiang
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/11/26
Complete coverages
Debugging methods
Dynamic analysis techniques
Dynamic execution
Multi-threaded programs
Multithreaded softwares
Sequential softwares
Synergistic integration
Dependence Guided Symbolic Execution
期刊论文
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2017, 卷号: 43, 页码: 252-271
作者:
Wang, Haijun
;
Liu, Ting
;
Guan, Xiaohong
;
Shen, Chao
;
Zheng, Qinghua
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/11/26
path coverage
Symbolic execution
program dependence
Automated Testing of Definition-Use Data Flow for Multithreaded Programs
会议论文
作者:
Zhang, Xiaodong
;
Yang, Zijiang
;
Zheng, Qinghua
;
Liu, Pei
;
Chang, Jialiang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/26
Multithreaded Program
Definition-Use
Symbolic Analysis
Guided Execution
©版权所有 ©2017 CSpace - Powered by
CSpace