共 37 条
- [11] Cha S K, Avgerinos T, Rebert A, Et al., Unleashing mayhem on binary code[C], Proc of the 33rd IEEE Symp on Security and Privacy (SP), pp. 380-394, (2012)
- [12] Mouzarani M, Sadeghiyan B, Zolfaghari M., A smart fuzzing method for detecting heap-based buffer overflow in executable codes[C], Proc of the 21st IEEE Pacific Rim Int Symp on Dependable Computing (PRDC), pp. 42-49, (2015)
- [13] Kai Cheng, Li Qiang, Wang Lei, Et al., DTaint: Detecting the taint-style vulnerability in embedded device firmware[C], Proc of the 48th Annual IEEE/IFIP Int Conf on Dependable Systems and Networks (DSN), pp. 430-441, (2018)
- [14] Chen Libo, Wang Yanhao, Cai Quanpu, Et al., Sharing more and checking less: Leveraging common input keywords to detect bugs in embedded systems[C], Proc of the 30th USENIX Security Symp (USENIX Security 21), pp. 303-319, (2021)
- [15] A buffer overflow in the httpd daemon on TP-Link TL-WR841N V10
- [16] Fast library identification and recognition technology
- [17] The Official Radare2 Book[M/OL], (2018)
- [18] Options that control optimization
- [19] Jian Liu, Purui Su, Min Yang, Et al., Software and cyber security—A survey[J], Journal of Software, 29, 1, (2018)
- [20] Qian Chen, Kai Cheng, Yaowen Zheng, Et al., Function-level data dependence graph and its application in static vulnerability analysis[J], Journal of Software, 31, 11, pp. 3421-3435, (2020)