[1] 李舟军, 张俊贤, 廖湘科, 等. 软件安全漏洞检测技术[J]. 计算机学报, 2015, 38(4):717-732. Li Zhoujun, Zhang Junxian, Liao Xiangke, et al. Survey of software vulnerability detection techniques[J]. Journal of Computers, 2015, 38(4):717-732.
[2] Cseppento L, Micskei Z. Evaluating symbolic execution-based test tools[C]//International Conference on Software Testing, Verification and Validation (ICST 2015). San Diego, USA:IEEE, 2015:13-17.
[3] Amin N, Rustan K, Leino M, et al. Computing with an SMT solver[J]. Lecture Notes in Computer Science, 2014(8570):20-35.
[4] Zhang Junxian, Li Zhoujun, Zheng Xianchen. PathWalker:a dynamic symbolic execution tool based on LLVM byte code instrumentation[C]//Symposium on Dependable Software Engineering:Theories, Tools and Applications (SETTA 2015). New York, USA:Springer, 2015:228-242.
[5] Lattner C, Adve V. LLVM:a compilation framework for lifelong program analysis and transformation[C]//International Symposium on Code Generation and Optimization (CGO 2004). San Jose, CA, USA:IEEE, 2004:75-88. |