引用本文: | 赵尚儒, 李学俊, 方越, 余媛萍, 黄伟豪, 陈恺, 苏璞睿, 张玉清. 安全漏洞自动利用综述[J]. 计算机研究与发展, 2019, 56(10): 2097-2111. doi: 10.7544/issn1000-1239.2019.20190655 |
Citation: | Zhao Shangru, Li Xuejun, Fang Yue, Yu Yuanping, Huang Weihao, Chen Kai, Su Purui, Zhang Yuqing. A Survey on Automated Exploit Generation[J]. Journal of Computer Research and Development, 2019, 56(10): 2097-2111. doi: 10.7544/issn1000-1239.2019.20190655 |