共 37 条
- [1] 2021 CWE top 25 most dangerous software weaknesses
- [2] CWE-787: Out-of-bounds write
- [3] CWE-125: Out-of-bounds read
- [4] CWE-119: Improper restriction of operations within the bounds of a memory buffer
- [5] Yawen Wang, Xinhong Yao, Yunzhan Gong, Et al., A method of buffer overflow detection based on static code analysis[J], Journal of Computer Research and Development, 49, 4, (2012)
- [6] Zhen Li, Deqing Zou, Zeli Wang, Et al., Survey on static software vulnerability detection for source code[J], Chinese Journal of Network and Information Security, 5, 1, (2019)
- [7] Heelan S, Gianni A., Augmenting vulnerability analysis of binary code[C], Proc of the 28th Annual Computer Security Applications Conf, pp. 199-208, (2012)
- [8] Redini N, Machiry A, Das D, Et al., BootStomp: On the security of bootloaders in mobile devices[C], Proc of the 26th USENIX Security Symp (USENIX Security 17), pp. 781-798, (2017)
- [9] Redini N, Machiry A, Wang Ruoyu, Et al., Karonte: Detecting insecure multi-binary interactions in embedded firmware[C], Proc of the 41st IEEE Symp on Security and Privacy (SP), pp. 1544-1561, (2020)
- [10] Chipounov V, Kuznetsov V, Candea G., S2E: A platform for in-vivo multi-path analysis of software systems[J], ACM SIGPLAN Notices, 46, 3, pp. 265-278, (2011)