Volume 33,Issue 6,2022 Table of ContentsDownload Contents
Verification Method of Hierarchical for Safety-critical Memory Management SystemsLI Shao-Feng, QIAO Lei, YANG Meng-Fei, ZHANG Jin-Kun, MA Zhi, LIU Hong-BiaoPublished June 6, 2022 (19 pages)2022,33(6):2312-2330 [Abstract(939)] [View PDF(2406)2.04 M]Histogram Publication under Shuffled Differential PrivacyZHANG Xiao-Jian, XU Ya-Xin, XIA Qing-RongPublished June 6, 2022 (16 pages)2022,33(6):2348-2363 [Abstract(1149)] [View PDF(3324)1.57 M]
系统软件安全专题前言杨珉,张超,宋富,张源Published June 6, 2022 (2 pages)2022,33(6):1959-1960 [Abstract(1262)] [View PDF(2927)323.89 K]Counterexample-guided Spatial Flow Model Checking Methods for C CodesYU Yin-Bo, LIU Jia-Jia, MU De-JunPublished June 6, 2022 (18 pages)2022,33(6):1961-1977 [Abstract(1391)] [View PDF(3857)1.90 M]TaintPoint: Fuzzing Taint Flow Efficiently with Live TraceFANG Hao-Ran, GUO Fan, LI Hang-YuPublished June 6, 2022 (20 pages)2022,33(6):1978-1995 [Abstract(1856)] [View PDF(4016)1.85 M]Compiler Fuzzing Test Case Generation with Feed-forward Neural NetworkXU Hao-Ran, WANG Yong-Jun, HUANG Zhi-Jian, XIE Pei-Dai, FAN Shu-HuiPublished June 6, 2022 (17 pages)2022,33(6):1996-2011 [Abstract(1865)] [View PDF(4084)1.69 M]Memory Optimization System for SGXv2 Trusted Execution EnvironmentLI Ming-Yu, XIA Yu-Bin, CHEN Hai-BoPublished June 6, 2022 (18 pages)2022,33(6):2012-2029 [Abstract(1698)] [View PDF(4469)1.76 M]Refcount Field Identification for Linux Kernel Based on Deep LearningTAN Xin, YANG Xi-Yu, CAO Jia-Jun, ZHANG YuanPublished June 6, 2022 (18 pages)2022,33(6):2030-2046 [Abstract(1478)] [View PDF(3745)1.60 M]Repeating Toast Drawing Based Password Inference Attack TechniqueLING Zhen, YANG Yan, LIU Rui-Zhao, ZHANG Yue, JIA Kang, YANG MingPublished June 6, 2022 (15 pages)2022,33(6):2047-2060 [Abstract(1323)] [View PDF(3313)1.37 M]Study of State-of-the-art Open-source C/C++ Static Analysis ToolsLI Guang-Wei, YUAN Ting, LI LianPublished June 6, 2022 (23 pages)2022,33(6):2061-2081 [Abstract(2514)] [View PDF(5101)1.97 M]Exploit-oriented Automated Information LeakageYANG Song-Tao, CHEN Kai-Xiang, WANG Zhun, ZHANG ChaoPublished June 6, 2022 (14 pages)2022,33(6):2082-2096 [Abstract(1384)] [View PDF(3728)1.47 M]Cross-project Defect Prediction Method Using Adversarial LearningXING Ying, QIAN Xiao-Meng, GUAN Yu, ZHANG Shi-Hao, ZHAO Meng-Ci, LIN Wan-TingPublished June 6, 2022 (16 pages)2022,33(6):2097-2112 [Abstract(1974)] [View PDF(4310)1.57 M]定理证明理论与应用专题前言曹钦翔,詹博华,赵永望Published June 6, 2022 (2 pages)2022,33(6):2113-2114 [Abstract(829)] [View PDF(3528)287.42 K]Mechanized Verification of Efficient Iterative Data-flow AlgorithmJIANG Nan, WANG Lü-Meng, ZHANG Xiao-Tong, HE Yan-XiangPublished June 6, 2022 (13 pages)2022,33(6):2115-2126 [Abstract(856)] [View PDF(3209)1.13 M]Semantics under Step-indexed Model and FormalizationGUO Hao, CAO Qin-XiangPublished June 6, 2022 (24 pages)2022,33(6):2127-2149 [Abstract(869)] [View PDF(3102)2.02 M]Coq Formalization of Propulsion Subsystem of Flight Control System for MulticopterSHI Zheng-Pu, CUI Min, XIE Guo-Jun, CHEN GangPublished June 6, 2022 (22 pages)2022,33(6):2150-2171 [Abstract(1054)] [View PDF(3250)2.14 M]Implementation of Theorem Prover for PPTL with Indexed ExpressionsWANG Xiao-Bing, KOU Meng-Sha, LI Chun-Yi, ZHAO LiangPublished June 6, 2022 (18 pages)2022,33(6):2172-2188 [Abstract(918)] [View PDF(3099)1.74 M]Refinement-based Verification of Memory Isolation Mechanism for Trusted Execution EnvironmentJIN Cui-Zhen, ZHANG Qian-Ying, MA Yu-Wei, LI Xi-Meng, WANG Guo-Hui, SHI Zhi-Ping, GUAN YongPublished June 6, 2022 (18 pages)2022,33(6):2189-2207 [Abstract(1370)] [View PDF(3594)1.70 M]Formalization of C.T.Yang’s Theorem in CoqYAN Sheng, YU Wen-Sheng, FU Yao-ShunPublished June 6, 2022 (15 pages)2022,33(6):2208-2223 [Abstract(1180)] [View PDF(3516)1.58 M]Coq-based Matrix Code Generation TechnologyMA Ying-Ying, CHEN GangPublished June 6, 2022 (23 pages)2022,33(6):2224-2245 [Abstract(1016)] [View PDF(3447)1.95 M]Formalization of Collision Detection Method for RobotsCHEN Shan-Yan, GUAN Yong, SHI Zhi-Ping, WANG Guo-HuiPublished June 6, 2022 (21 pages)2022,33(6):2246-2263 [Abstract(1079)] [View PDF(4003)1.67 M]Tool for Verifying Cloud Block Storage Based on Separation LogicZHANG Bo-Wen, JIN Zhao, WANG Han-Pin, CAO Yong-ZhiPublished June 6, 2022 (24 pages)2022,33(6):2264-2287 [Abstract(986)] [View PDF(3339)2.23 M]
Systematic Literature Review of Duplicated Bug Report Detection MethodsZHENG Wei, WANG Xiao-Long, CHEN Xiang, XIA Xin, LIAO Hui-Ling, LIU Cheng-Yuan, SUN Rui-YangPublished June 6, 2022 (26 pages)2022,33(6):2288-2311 [Abstract(2930)] [View PDF(5963)2.19 M]
Multi-attribute Data Indexing for Query Based Entity ResolutionSUN Chen-Chen, SHEN De-Rong, XIAO Ying-Yuan, LI Yu-KunPublished June 6, 2022 (17 pages)2022,33(6):2331-2347 [Abstract(1640)] [View PDF(3076)1.72 M]