Volume 29,Issue 5,2018 Table of Contents
Projection Approach for Keeping the Behavior Consistency Between Choreography and PeersDAI Fei, CHEN Feng-Qiang, MO Qi, WANG Wei, LI Tong and LIANG Zhi-Hong2018,29(5):1451-1470 [Abstract(2308)] [View PDF(3556)2.75 M]
Preface of Software Vulnerability DetectionWANG Lin-Zhang, CHEN Kai and WANG Ji2018,29(5):1177-1178 [Abstract(3288)] [View PDF(6634)374.72 K]Progress in Research on Buffer Overflow Vulnerability Analysis TechnologiesSHAO Si-Hao, GAO Qing, MA Sen, DUAN Fu-Yao, MA Xiao, ZHANG Shi-Kun and HU Jin-Hua2018,29(5):1179-1198 [Abstract(5403)] [View PDF(10345)2.06 M]Approach of Leveraging Patches to Discover Unknown VulnerabilitiesLI Zan, BIAN Pan, SHI Wen-Chang and LIANG Bin2018,29(5):1199-1212 [Abstract(3558)] [View PDF(7739)1.40 M]Vulnerability Life Cycle Oriented Security Risk Metric MethodHU Hao, YE Run-Guo, ZHANG Hong-Qi, CHANG De-Xian, LIU Yu-Ling and YANG Ying-Jie2018,29(5):1213-1229 [Abstract(3912)] [View PDF(7514)1.90 M]Method for Automated Detection of Suspicious Vulnerability Related to Numerical StabilitySHEN Wei-Jun, TANG En-Yi, CHEN Zhen-Yu, CHEN Xin, LI Bin and ZHAI Juan2018,29(5):1230-1243 [Abstract(4034)] [View PDF(6315)1.57 M]Incremental Resource Leak Detection for Large Scale Source CodeGAO Zhi-Wei, JI Wei-Xing, SHI Jian-Jun, WANG Yi-Zhuo, GAO Yu-Jin, LIAO Xin-Yi, LUO Hui and SHI Feng2018,29(5):1244-1257 [Abstract(3325)] [View PDF(6012)1.71 M]Programmable Fuzzing TechnologyYANG Mei-Fang, HUO Wei, ZOU Yan-Yan, YIN Jia-Wei, LIU Bao-Xu, GONG Xiao-Rui, JIA Xiao-Qi and ZOU Wei2018,29(5):1258-1274 [Abstract(4835)] [View PDF(9515)2.12 M]Browser Fuzzing Technique Based on Pattern-GenerationHUO Wei, DAI Ge, SHI Ji, GONG Xiao-Rui, JIA Xiao-Qi, SONG Zhen-Yu, LIU Bao-Xu and ZOU Wei2018,29(5):1275-1287 [Abstract(4054)] [View PDF(7811)1.38 M]Real Time Idle State Decection Method in Fuzzing Test in GUI ProgramZHANG Xing, FENG Chao, LEI Jing and TANG Chao-Jing2018,29(5):1288-1302 [Abstract(3943)] [View PDF(8335)1.69 M]Vulnerability Discovery Method for Virtualization in IaaS Based on Self-Adapting Fuzzing TestSHA Le-Tian, XIAO Fu, YANG Hong-Ke, YU Hui and WANG Ru-Chuan2018,29(5):1303-1317 [Abstract(4424)] [View PDF(6786)1.57 M]Security Reinforcement of Accessibility Service Based on Decentralized Information Flow ControlLI Xiao-Juan and CHEN Hai-Bo2018,29(5):1318-1332 [Abstract(3372)] [View PDF(5865)1.64 M]Transparent Protection of Kernel Module Against ROP with Intel Processor TraceWANG Xin-Ran, LIU Yu-Tao and CHEN Hai-Bo2018,29(5):1333-1347 [Abstract(3605)] [View PDF(6383)1.77 M]Security Detection Model of BlockchainYE Cong-Cong, LI Guo-Qiang, CAI Hong-Ming and GU Yong-Gen2018,29(5):1348-1359 [Abstract(5860)] [View PDF(9506)1.29 M]Security and Safety Threat Detection Method for Unmanned Aerial System Based on Runtime VerificationYANG Dong, SHI Hao, DONG Wei, LIU Zong-Lin and ZHOU Ge2018,29(5):1360-1378 [Abstract(4098)] [View PDF(7618)2.42 M]Security Analysis of the Third-Party SDKs in the Android EcosystemMA Kai and GUO Shan-Qing2018,29(5):1379-1391 [Abstract(4457)] [View PDF(10428)1.65 M]Mobile Advertising Loophole Attack Technology Based on Host APP's PermissionsWANG Chi-Heng, CHEN Jing, SU Han, HE Kun and DU Rui-Ying2018,29(5):1392-1409 [Abstract(3523)] [View PDF(6491)2.12 M]Web Page Trojan Detection Method Based on Dynamic Behavior AnalysisZHANG Wei-Feng, LIU Rui-Cheng and XU Lei2018,29(5):1410-1421 [Abstract(3725)] [View PDF(7477)1.29 M]
Investigation of Empirical Researches in Software EngineeringZHANG Li, PU Meng-Yuan, LIU Yi-Jun, TIAN Jia-Hao, YUE Tao and JIANG Jing2018,29(5):1422-1450 [Abstract(5689)] [View PDF(13118)7.21 M]Survey on Medical Image Computer Aided Detection and Diagnosis SystemsZHENG Guang-Yuan, LIU Xia-Bi and HAN Guang-Hui2018,29(5):1471-1514 [Abstract(6593)] [View PDF(37056)4.38 M]