[1] |
Yu Chang, Wang Yawen, Lin Huan, Gong Yunzhan.
Fault Detection Context Based Equivalent Mutant Identification Algorithm
[J]. Journal of Computer Research and Development, 2021, 58(1): 83-97.
|
[2] |
Guo Fangfang, Wang Xinyue, Wang Huiqiang, Lü Hongwu, Hu Yibing, Wu Fang, Feng Guangsheng, Zhao Qian.
A Dynamic Stain Analysis Method on Maximal Frequent Sub Graph Mining
[J]. Journal of Computer Research and Development, 2020, 57(3): 631-638.
|
[3] |
Wang Lei, He Dongjie, Li Lian, Feng Xiaobing.
Sparse Framework Based Static Taint Analysis Optimization
[J]. Journal of Computer Research and Development, 2019, 56(3): 480-495.
|
[4] |
Zhang Lei, Yang Zhemin, Li Mingqi, Yang Min.
TipTracer: Detecting Android Application Vulnerabilities Based on the Compliance with Security Guidance
[J]. Journal of Computer Research and Development, 2019, 56(11): 2315-2329.
|
[5] |
Yue Hongzhou, Zhang Yuqing, Wang Wenjie, Liu Qixu.
Android Static Taint Analysis of Dynamic Loading and Reflection Mechanism
[J]. Journal of Computer Research and Development, 2017, 54(2): 313-327.
|
[6] |
Lu Yemian, Ying Lingyun, Su Purui, Feng Dengguo, Jing Erxia, Gu Yacong.
Security Analysis and Evaluation for the Usage of Settings Mechanism in Android
[J]. Journal of Computer Research and Development, 2016, 53(10): 2248-2261.
|
[7] |
Zhang Huilin, Ding Yu, Zhang Lihua, Duan Lei, Zhang Chao, Wei Tao, Li Guancheng, Han Xinhui.
SQL Injection Prevention Based on Sensitive Characters
[J]. Journal of Computer Research and Development, 2016, 53(10): 2262-2276.
|
[8] |
Meng Xiaofeng, Zhang Xiaojian.
Big Data Privacy Management
[J]. Journal of Computer Research and Development, 2015, 52(2): 265-281.
|
[9] |
Zhang Yuqing, Fang Zhejun, Wang Kai, Wang Zhiqiang, Yue Hongzhou, Liu Qixu, He Yuan, Li Xiaoqi, Yang Gang.
Survey of Android Vulnerability Detection
[J]. Journal of Computer Research and Development, 2015, 52(10): 2167-2177.
|
[10] |
Dong Longming, Wang Ji, Chen Liqian, and Dong Wei.
Memory Leak Detection for Heap-Manipulating Programs Based on Local Heap Abstraction
[J]. , 2012, 49(9): 1832-1842.
|
[11] |
Zhou Hongbo, Jin Dahai, and Gong Yunzhan.
Application of Interval Arithmetic in Software Testing Based on Field-Sensitive Point-to Analysis
[J]. , 2012, 49(9): 1852-1862.
|
[12] |
Wang Yawen, Yao Xinhong, Gong Yunzhan, and Yang Zhaohong.
A Method of Buffer Overflow Detection Based on Static Code Analysis
[J]. , 2012, 49(4): 839-845.
|
[13] |
Wang Lei, Chen Gui, and Jin Maozhong.
Detection of Code Vulnerabilities via Constraint-Based Analysis and Model Checking
[J]. , 2011, 48(9): 1659-1666.
|
[14] |
Han Wei, and He Yeping.
Static Analysis of TOCTTOU Vulnerabilities in Unix-Style File System
[J]. , 2011, 48(8): 1430-1437.
|
[15] |
Hu Chaojian, Li Zhoujun, Guo Tao, and Shi Zhiwei.
Detecting the Vulnerability Pattern of Writing Tainted Value to Tainted Address
[J]. , 2011, 48(8): 1455-1463.
|