Volume 29,Issue 5,2018 Table of Contents
Projection Approach for Keeping the Behavior Consistency Between Choreography and PeersDAI Fei, CHEN Feng-Qiang, MO Qi, WANG Wei, LI Tong and LIANG Zhi-Hong2018,29(5):1451-1470 [Abstract(2283)] [View PDF(3396)2.75 M]
Preface of Software Vulnerability DetectionWANG Lin-Zhang, CHEN Kai and WANG Ji2018,29(5):1177-1178 [Abstract(3249)] [View PDF(6142)374.72 K]Progress in Research on Buffer Overflow Vulnerability Analysis TechnologiesSHAO Si-Hao, GAO Qing, MA Sen, DUAN Fu-Yao, MA Xiao, ZHANG Shi-Kun and HU Jin-Hua2018,29(5):1179-1198 [Abstract(5306)] [View PDF(9100)2.06 M]Approach of Leveraging Patches to Discover Unknown VulnerabilitiesLI Zan, BIAN Pan, SHI Wen-Chang and LIANG Bin2018,29(5):1199-1212 [Abstract(3523)] [View PDF(7167)1.40 M]Vulnerability Life Cycle Oriented Security Risk Metric MethodHU Hao, YE Run-Guo, ZHANG Hong-Qi, CHANG De-Xian, LIU Yu-Ling and YANG Ying-Jie2018,29(5):1213-1229 [Abstract(3863)] [View PDF(6869)1.90 M]Method for Automated Detection of Suspicious Vulnerability Related to Numerical StabilitySHEN Wei-Jun, TANG En-Yi, CHEN Zhen-Yu, CHEN Xin, LI Bin and ZHAI Juan2018,29(5):1230-1243 [Abstract(3995)] [View PDF(5803)1.57 M]Incremental Resource Leak Detection for Large Scale Source CodeGAO Zhi-Wei, JI Wei-Xing, SHI Jian-Jun, WANG Yi-Zhuo, GAO Yu-Jin, LIAO Xin-Yi, LUO Hui and SHI Feng2018,29(5):1244-1257 [Abstract(3266)] [View PDF(5401)1.71 M]Programmable Fuzzing TechnologyYANG Mei-Fang, HUO Wei, ZOU Yan-Yan, YIN Jia-Wei, LIU Bao-Xu, GONG Xiao-Rui, JIA Xiao-Qi and ZOU Wei2018,29(5):1258-1274 [Abstract(4782)] [View PDF(8851)2.12 M]Browser Fuzzing Technique Based on Pattern-GenerationHUO Wei, DAI Ge, SHI Ji, GONG Xiao-Rui, JIA Xiao-Qi, SONG Zhen-Yu, LIU Bao-Xu and ZOU Wei2018,29(5):1275-1287 [Abstract(4013)] [View PDF(7145)1.38 M]Real Time Idle State Decection Method in Fuzzing Test in GUI ProgramZHANG Xing, FENG Chao, LEI Jing and TANG Chao-Jing2018,29(5):1288-1302 [Abstract(3893)] [View PDF(7623)1.69 M]Vulnerability Discovery Method for Virtualization in IaaS Based on Self-Adapting Fuzzing TestSHA Le-Tian, XIAO Fu, YANG Hong-Ke, YU Hui and WANG Ru-Chuan2018,29(5):1303-1317 [Abstract(4380)] [View PDF(6150)1.57 M]Security Reinforcement of Accessibility Service Based on Decentralized Information Flow ControlLI Xiao-Juan and CHEN Hai-Bo2018,29(5):1318-1332 [Abstract(3352)] [View PDF(5312)1.64 M]Transparent Protection of Kernel Module Against ROP with Intel Processor TraceWANG Xin-Ran, LIU Yu-Tao and CHEN Hai-Bo2018,29(5):1333-1347 [Abstract(3561)] [View PDF(5745)1.77 M]Security Detection Model of BlockchainYE Cong-Cong, LI Guo-Qiang, CAI Hong-Ming and GU Yong-Gen2018,29(5):1348-1359 [Abstract(5812)] [View PDF(8909)1.29 M]Security and Safety Threat Detection Method for Unmanned Aerial System Based on Runtime VerificationYANG Dong, SHI Hao, DONG Wei, LIU Zong-Lin and ZHOU Ge2018,29(5):1360-1378 [Abstract(4049)] [View PDF(6646)2.42 M]Security Analysis of the Third-Party SDKs in the Android EcosystemMA Kai and GUO Shan-Qing2018,29(5):1379-1391 [Abstract(4406)] [View PDF(9106)1.65 M]Mobile Advertising Loophole Attack Technology Based on Host APP's PermissionsWANG Chi-Heng, CHEN Jing, SU Han, HE Kun and DU Rui-Ying2018,29(5):1392-1409 [Abstract(3483)] [View PDF(5923)2.12 M]Web Page Trojan Detection Method Based on Dynamic Behavior AnalysisZHANG Wei-Feng, LIU Rui-Cheng and XU Lei2018,29(5):1410-1421 [Abstract(3694)] [View PDF(6919)1.29 M]
Investigation of Empirical Researches in Software EngineeringZHANG Li, PU Meng-Yuan, LIU Yi-Jun, TIAN Jia-Hao, YUE Tao and JIANG Jing2018,29(5):1422-1450 [Abstract(5624)] [View PDF(12336)7.21 M]Survey on Medical Image Computer Aided Detection and Diagnosis SystemsZHENG Guang-Yuan, LIU Xia-Bi and HAN Guang-Hui2018,29(5):1471-1514 [Abstract(6363)] [View PDF(35333)4.38 M]