Volume 29,Issue 5,2018 Table of Contents

Other Issues:  
  
Contents

  • Projection Approach for Keeping the Behavior Consistency Between Choreography and Peers
  • DAI Fei, CHEN Feng-Qiang, MO Qi, WANG Wei, LI Tong and LIANG Zhi-Hong
  • 2018,29(5):1451-1470 [Abstract(2283)]  [View PDF(3396)2.75 M]
  • Special Issue's Articles

  • Preface of Software Vulnerability Detection
  • WANG Lin-Zhang, CHEN Kai and WANG Ji
  • 2018,29(5):1177-1178 [Abstract(3249)]  [View PDF(6142)374.72 K]
  • Progress in Research on Buffer Overflow Vulnerability Analysis Technologies
  • SHAO Si-Hao, GAO Qing, MA Sen, DUAN Fu-Yao, MA Xiao, ZHANG Shi-Kun and HU Jin-Hua
  • 2018,29(5):1179-1198 [Abstract(5306)]  [View PDF(9100)2.06 M]
  • Approach of Leveraging Patches to Discover Unknown Vulnerabilities
  • LI Zan, BIAN Pan, SHI Wen-Chang and LIANG Bin
  • 2018,29(5):1199-1212 [Abstract(3523)]  [View PDF(7167)1.40 M]
  • Vulnerability Life Cycle Oriented Security Risk Metric Method
  • HU Hao, YE Run-Guo, ZHANG Hong-Qi, CHANG De-Xian, LIU Yu-Ling and YANG Ying-Jie
  • 2018,29(5):1213-1229 [Abstract(3863)]  [View PDF(6869)1.90 M]
  • Method for Automated Detection of Suspicious Vulnerability Related to Numerical Stability
  • SHEN Wei-Jun, TANG En-Yi, CHEN Zhen-Yu, CHEN Xin, LI Bin and ZHAI Juan
  • 2018,29(5):1230-1243 [Abstract(3995)]  [View PDF(5803)1.57 M]
  • Incremental Resource Leak Detection for Large Scale Source Code
  • GAO Zhi-Wei, JI Wei-Xing, SHI Jian-Jun, WANG Yi-Zhuo, GAO Yu-Jin, LIAO Xin-Yi, LUO Hui and SHI Feng
  • 2018,29(5):1244-1257 [Abstract(3266)]  [View PDF(5401)1.71 M]
  • Programmable Fuzzing Technology
  • YANG Mei-Fang, HUO Wei, ZOU Yan-Yan, YIN Jia-Wei, LIU Bao-Xu, GONG Xiao-Rui, JIA Xiao-Qi and ZOU Wei
  • 2018,29(5):1258-1274 [Abstract(4782)]  [View PDF(8851)2.12 M]
  • Browser Fuzzing Technique Based on Pattern-Generation
  • HUO Wei, DAI Ge, SHI Ji, GONG Xiao-Rui, JIA Xiao-Qi, SONG Zhen-Yu, LIU Bao-Xu and ZOU Wei
  • 2018,29(5):1275-1287 [Abstract(4013)]  [View PDF(7145)1.38 M]
  • Real Time Idle State Decection Method in Fuzzing Test in GUI Program
  • ZHANG Xing, FENG Chao, LEI Jing and TANG Chao-Jing
  • 2018,29(5):1288-1302 [Abstract(3893)]  [View PDF(7623)1.69 M]
  • Vulnerability Discovery Method for Virtualization in IaaS Based on Self-Adapting Fuzzing Test
  • SHA Le-Tian, XIAO Fu, YANG Hong-Ke, YU Hui and WANG Ru-Chuan
  • 2018,29(5):1303-1317 [Abstract(4380)]  [View PDF(6150)1.57 M]
  • Security Reinforcement of Accessibility Service Based on Decentralized Information Flow Control
  • LI Xiao-Juan and CHEN Hai-Bo
  • 2018,29(5):1318-1332 [Abstract(3352)]  [View PDF(5312)1.64 M]
  • Transparent Protection of Kernel Module Against ROP with Intel Processor Trace
  • WANG Xin-Ran, LIU Yu-Tao and CHEN Hai-Bo
  • 2018,29(5):1333-1347 [Abstract(3561)]  [View PDF(5745)1.77 M]
  • Security Detection Model of Blockchain
  • YE Cong-Cong, LI Guo-Qiang, CAI Hong-Ming and GU Yong-Gen
  • 2018,29(5):1348-1359 [Abstract(5812)]  [View PDF(8909)1.29 M]
  • Security and Safety Threat Detection Method for Unmanned Aerial System Based on Runtime Verification
  • YANG Dong, SHI Hao, DONG Wei, LIU Zong-Lin and ZHOU Ge
  • 2018,29(5):1360-1378 [Abstract(4049)]  [View PDF(6646)2.42 M]
  • Security Analysis of the Third-Party SDKs in the Android Ecosystem
  • MA Kai and GUO Shan-Qing
  • 2018,29(5):1379-1391 [Abstract(4406)]  [View PDF(9106)1.65 M]
  • Mobile Advertising Loophole Attack Technology Based on Host APP's Permissions
  • WANG Chi-Heng, CHEN Jing, SU Han, HE Kun and DU Rui-Ying
  • 2018,29(5):1392-1409 [Abstract(3483)]  [View PDF(5923)2.12 M]
  • Web Page Trojan Detection Method Based on Dynamic Behavior Analysis
  • ZHANG Wei-Feng, LIU Rui-Cheng and XU Lei
  • 2018,29(5):1410-1421 [Abstract(3694)]  [View PDF(6919)1.29 M]
  • Review Articles

  • Investigation of Empirical Researches in Software Engineering
  • ZHANG Li, PU Meng-Yuan, LIU Yi-Jun, TIAN Jia-Hao, YUE Tao and JIANG Jing
  • 2018,29(5):1422-1450 [Abstract(5624)]  [View PDF(12336)7.21 M]
  • Survey on Medical Image Computer Aided Detection and Diagnosis Systems
  • ZHENG Guang-Yuan, LIU Xia-Bi and HAN Guang-Hui
  • 2018,29(5):1471-1514 [Abstract(6363)]  [View PDF(35333)4.38 M]