Volume 33,Issue 6,2022 Table of ContentsDownload Contents

Other Issues:  
  
Contents

  • Verification Method of Hierarchical for Safety-critical Memory Management Systems
  • LI Shao-Feng, QIAO Lei, YANG Meng-Fei, ZHANG Jin-Kun, MA Zhi, LIU Hong-Biao
  • Published June 6, 2022 (19 pages)
  • 2022,33(6):2312-2330 [Abstract(939)]  [View PDF(2406)2.04 M]
  • Histogram Publication under Shuffled Differential Privacy
  • ZHANG Xiao-Jian, XU Ya-Xin, XIA Qing-Rong
  • Published June 6, 2022 (16 pages)
  • 2022,33(6):2348-2363 [Abstract(1149)]  [View PDF(3324)1.57 M]
  • Special Issue's Articles

  • 系统软件安全专题前言
  • 杨珉,张超,宋富,张源
  • Published June 6, 2022 (2 pages)
  • 2022,33(6):1959-1960 [Abstract(1262)]  [View PDF(2927)323.89 K]
  • Counterexample-guided Spatial Flow Model Checking Methods for C Codes
  • YU Yin-Bo, LIU Jia-Jia, MU De-Jun
  • Published June 6, 2022 (18 pages)
  • 2022,33(6):1961-1977 [Abstract(1391)]  [View PDF(3857)1.90 M]
  • TaintPoint: Fuzzing Taint Flow Efficiently with Live Trace
  • FANG Hao-Ran, GUO Fan, LI Hang-Yu
  • Published June 6, 2022 (20 pages)
  • 2022,33(6):1978-1995 [Abstract(1856)]  [View PDF(4016)1.85 M]
  • Compiler Fuzzing Test Case Generation with Feed-forward Neural Network
  • XU Hao-Ran, WANG Yong-Jun, HUANG Zhi-Jian, XIE Pei-Dai, FAN Shu-Hui
  • Published June 6, 2022 (17 pages)
  • 2022,33(6):1996-2011 [Abstract(1865)]  [View PDF(4084)1.69 M]
  • Memory Optimization System for SGXv2 Trusted Execution Environment
  • LI Ming-Yu, XIA Yu-Bin, CHEN Hai-Bo
  • Published June 6, 2022 (18 pages)
  • 2022,33(6):2012-2029 [Abstract(1698)]  [View PDF(4469)1.76 M]
  • Refcount Field Identification for Linux Kernel Based on Deep Learning
  • TAN Xin, YANG Xi-Yu, CAO Jia-Jun, ZHANG Yuan
  • Published June 6, 2022 (18 pages)
  • 2022,33(6):2030-2046 [Abstract(1478)]  [View PDF(3745)1.60 M]
  • Repeating Toast Drawing Based Password Inference Attack Technique
  • LING Zhen, YANG Yan, LIU Rui-Zhao, ZHANG Yue, JIA Kang, YANG Ming
  • Published June 6, 2022 (15 pages)
  • 2022,33(6):2047-2060 [Abstract(1323)]  [View PDF(3313)1.37 M]
  • Study of State-of-the-art Open-source C/C++ Static Analysis Tools
  • LI Guang-Wei, YUAN Ting, LI Lian
  • Published June 6, 2022 (23 pages)
  • 2022,33(6):2061-2081 [Abstract(2514)]  [View PDF(5101)1.97 M]
  • Exploit-oriented Automated Information Leakage
  • YANG Song-Tao, CHEN Kai-Xiang, WANG Zhun, ZHANG Chao
  • Published June 6, 2022 (14 pages)
  • 2022,33(6):2082-2096 [Abstract(1384)]  [View PDF(3728)1.47 M]
  • Cross-project Defect Prediction Method Using Adversarial Learning
  • XING Ying, QIAN Xiao-Meng, GUAN Yu, ZHANG Shi-Hao, ZHAO Meng-Ci, LIN Wan-Ting
  • Published June 6, 2022 (16 pages)
  • 2022,33(6):2097-2112 [Abstract(1974)]  [View PDF(4310)1.57 M]
  • 定理证明理论与应用专题前言
  • 曹钦翔,詹博华,赵永望
  • Published June 6, 2022 (2 pages)
  • 2022,33(6):2113-2114 [Abstract(829)]  [View PDF(3528)287.42 K]
  • Mechanized Verification of Efficient Iterative Data-flow Algorithm
  • JIANG Nan, WANG Lü-Meng, ZHANG Xiao-Tong, HE Yan-Xiang
  • Published June 6, 2022 (13 pages)
  • 2022,33(6):2115-2126 [Abstract(856)]  [View PDF(3209)1.13 M]
  • Semantics under Step-indexed Model and Formalization
  • GUO Hao, CAO Qin-Xiang
  • Published June 6, 2022 (24 pages)
  • 2022,33(6):2127-2149 [Abstract(869)]  [View PDF(3102)2.02 M]
  • Coq Formalization of Propulsion Subsystem of Flight Control System for Multicopter
  • SHI Zheng-Pu, CUI Min, XIE Guo-Jun, CHEN Gang
  • Published June 6, 2022 (22 pages)
  • 2022,33(6):2150-2171 [Abstract(1054)]  [View PDF(3250)2.14 M]
  • Implementation of Theorem Prover for PPTL with Indexed Expressions
  • WANG Xiao-Bing, KOU Meng-Sha, LI Chun-Yi, ZHAO Liang
  • Published June 6, 2022 (18 pages)
  • 2022,33(6):2172-2188 [Abstract(918)]  [View PDF(3099)1.74 M]
  • Refinement-based Verification of Memory Isolation Mechanism for Trusted Execution Environment
  • JIN Cui-Zhen, ZHANG Qian-Ying, MA Yu-Wei, LI Xi-Meng, WANG Guo-Hui, SHI Zhi-Ping, GUAN Yong
  • Published June 6, 2022 (18 pages)
  • 2022,33(6):2189-2207 [Abstract(1370)]  [View PDF(3594)1.70 M]
  • Formalization of C.T.Yang’s Theorem in Coq
  • YAN Sheng, YU Wen-Sheng, FU Yao-Shun
  • Published June 6, 2022 (15 pages)
  • 2022,33(6):2208-2223 [Abstract(1180)]  [View PDF(3516)1.58 M]
  • Coq-based Matrix Code Generation Technology
  • MA Ying-Ying, CHEN Gang
  • Published June 6, 2022 (23 pages)
  • 2022,33(6):2224-2245 [Abstract(1016)]  [View PDF(3447)1.95 M]
  • Formalization of Collision Detection Method for Robots
  • CHEN Shan-Yan, GUAN Yong, SHI Zhi-Ping, WANG Guo-Hui
  • Published June 6, 2022 (21 pages)
  • 2022,33(6):2246-2263 [Abstract(1079)]  [View PDF(4003)1.67 M]
  • Tool for Verifying Cloud Block Storage Based on Separation Logic
  • ZHANG Bo-Wen, JIN Zhao, WANG Han-Pin, CAO Yong-Zhi
  • Published June 6, 2022 (24 pages)
  • 2022,33(6):2264-2287 [Abstract(986)]  [View PDF(3339)2.23 M]
  • Review Articles

  • Systematic Literature Review of Duplicated Bug Report Detection Methods
  • ZHENG Wei, WANG Xiao-Long, CHEN Xiang, XIA Xin, LIAO Hui-Ling, LIU Cheng-Yuan, SUN Rui-Yang
  • Published June 6, 2022 (26 pages)
  • 2022,33(6):2288-2311 [Abstract(2930)]  [View PDF(5963)2.19 M]
  • Contents

  • Multi-attribute Data Indexing for Query Based Entity Resolution
  • SUN Chen-Chen, SHEN De-Rong, XIAO Ying-Yuan, LI Yu-Kun
  • Published June 6, 2022 (17 pages)
  • 2022,33(6):2331-2347 [Abstract(1640)]  [View PDF(3076)1.72 M]