Volume 29,Issue 5,2018 Table of Contents

Other Issues:  
  
Contents

  • Projection Approach for Keeping the Behavior Consistency Between Choreography and Peers
  • DAI Fei, CHEN Feng-Qiang, MO Qi, WANG Wei, LI Tong and LIANG Zhi-Hong
  • 2018,29(5):1451-1470 [Abstract(2219)]  [View PDF(2760)2.75 M]
  • Special Issue's Articles

  • Preface of Software Vulnerability Detection
  • WANG Lin-Zhang, CHEN Kai and WANG Ji
  • 2018,29(5):1177-1178 [Abstract(3135)]  [View PDF(4603)374.72 K]
  • Progress in Research on Buffer Overflow Vulnerability Analysis Technologies
  • SHAO Si-Hao, GAO Qing, MA Sen, DUAN Fu-Yao, MA Xiao, ZHANG Shi-Kun and HU Jin-Hua
  • 2018,29(5):1179-1198 [Abstract(5081)]  [View PDF(7431)2.06 M]
  • Approach of Leveraging Patches to Discover Unknown Vulnerabilities
  • LI Zan, BIAN Pan, SHI Wen-Chang and LIANG Bin
  • 2018,29(5):1199-1212 [Abstract(3353)]  [View PDF(5519)1.40 M]
  • Vulnerability Life Cycle Oriented Security Risk Metric Method
  • HU Hao, YE Run-Guo, ZHANG Hong-Qi, CHANG De-Xian, LIU Yu-Ling and YANG Ying-Jie
  • 2018,29(5):1213-1229 [Abstract(3727)]  [View PDF(5330)1.90 M]
  • Method for Automated Detection of Suspicious Vulnerability Related to Numerical Stability
  • SHEN Wei-Jun, TANG En-Yi, CHEN Zhen-Yu, CHEN Xin, LI Bin and ZHAI Juan
  • 2018,29(5):1230-1243 [Abstract(3843)]  [View PDF(4488)1.57 M]
  • Incremental Resource Leak Detection for Large Scale Source Code
  • GAO Zhi-Wei, JI Wei-Xing, SHI Jian-Jun, WANG Yi-Zhuo, GAO Yu-Jin, LIAO Xin-Yi, LUO Hui and SHI Feng
  • 2018,29(5):1244-1257 [Abstract(3124)]  [View PDF(3948)1.71 M]
  • Programmable Fuzzing Technology
  • YANG Mei-Fang, HUO Wei, ZOU Yan-Yan, YIN Jia-Wei, LIU Bao-Xu, GONG Xiao-Rui, JIA Xiao-Qi and ZOU Wei
  • 2018,29(5):1258-1274 [Abstract(4599)]  [View PDF(7260)2.12 M]
  • Browser Fuzzing Technique Based on Pattern-Generation
  • HUO Wei, DAI Ge, SHI Ji, GONG Xiao-Rui, JIA Xiao-Qi, SONG Zhen-Yu, LIU Bao-Xu and ZOU Wei
  • 2018,29(5):1275-1287 [Abstract(3866)]  [View PDF(5529)1.38 M]
  • Real Time Idle State Decection Method in Fuzzing Test in GUI Program
  • ZHANG Xing, FENG Chao, LEI Jing and TANG Chao-Jing
  • 2018,29(5):1288-1302 [Abstract(3761)]  [View PDF(4170)1.69 M]
  • Vulnerability Discovery Method for Virtualization in IaaS Based on Self-Adapting Fuzzing Test
  • SHA Le-Tian, XIAO Fu, YANG Hong-Ke, YU Hui and WANG Ru-Chuan
  • 2018,29(5):1303-1317 [Abstract(4228)]  [View PDF(4747)1.57 M]
  • Security Reinforcement of Accessibility Service Based on Decentralized Information Flow Control
  • LI Xiao-Juan and CHEN Hai-Bo
  • 2018,29(5):1318-1332 [Abstract(3275)]  [View PDF(3928)1.64 M]
  • Transparent Protection of Kernel Module Against ROP with Intel Processor Trace
  • WANG Xin-Ran, LIU Yu-Tao and CHEN Hai-Bo
  • 2018,29(5):1333-1347 [Abstract(3431)]  [View PDF(4385)1.77 M]
  • Security Detection Model of Blockchain
  • YE Cong-Cong, LI Guo-Qiang, CAI Hong-Ming and GU Yong-Gen
  • 2018,29(5):1348-1359 [Abstract(5686)]  [View PDF(7446)1.29 M]
  • Security and Safety Threat Detection Method for Unmanned Aerial System Based on Runtime Verification
  • YANG Dong, SHI Hao, DONG Wei, LIU Zong-Lin and ZHOU Ge
  • 2018,29(5):1360-1378 [Abstract(3900)]  [View PDF(4950)2.42 M]
  • Security Analysis of the Third-Party SDKs in the Android Ecosystem
  • MA Kai and GUO Shan-Qing
  • 2018,29(5):1379-1391 [Abstract(4147)]  [View PDF(7094)1.65 M]
  • Mobile Advertising Loophole Attack Technology Based on Host APP's Permissions
  • WANG Chi-Heng, CHEN Jing, SU Han, HE Kun and DU Rui-Ying
  • 2018,29(5):1392-1409 [Abstract(3385)]  [View PDF(4563)2.12 M]
  • Web Page Trojan Detection Method Based on Dynamic Behavior Analysis
  • ZHANG Wei-Feng, LIU Rui-Cheng and XU Lei
  • 2018,29(5):1410-1421 [Abstract(3579)]  [View PDF(5366)1.29 M]
  • Review Articles

  • Investigation of Empirical Researches in Software Engineering
  • ZHANG Li, PU Meng-Yuan, LIU Yi-Jun, TIAN Jia-Hao, YUE Tao and JIANG Jing
  • 2018,29(5):1422-1450 [Abstract(5469)]  [View PDF(10395)7.21 M]
  • Survey on Medical Image Computer Aided Detection and Diagnosis Systems
  • ZHENG Guang-Yuan, LIU Xia-Bi and HAN Guang-Hui
  • 2018,29(5):1471-1514 [Abstract(5808)]  [View PDF(31121)4.38 M]