Volume 29,Issue 5,2018 Table of Contents
Projection Approach for Keeping the Behavior Consistency Between Choreography and PeersDAI Fei, CHEN Feng-Qiang, MO Qi, WANG Wei, LI Tong and LIANG Zhi-Hong2018,29(5):1451-1470 [Abstract(2219)] [View PDF(2760)2.75 M]
Preface of Software Vulnerability DetectionWANG Lin-Zhang, CHEN Kai and WANG Ji2018,29(5):1177-1178 [Abstract(3135)] [View PDF(4603)374.72 K]Progress in Research on Buffer Overflow Vulnerability Analysis TechnologiesSHAO Si-Hao, GAO Qing, MA Sen, DUAN Fu-Yao, MA Xiao, ZHANG Shi-Kun and HU Jin-Hua2018,29(5):1179-1198 [Abstract(5081)] [View PDF(7431)2.06 M]Approach of Leveraging Patches to Discover Unknown VulnerabilitiesLI Zan, BIAN Pan, SHI Wen-Chang and LIANG Bin2018,29(5):1199-1212 [Abstract(3353)] [View PDF(5519)1.40 M]Vulnerability Life Cycle Oriented Security Risk Metric MethodHU Hao, YE Run-Guo, ZHANG Hong-Qi, CHANG De-Xian, LIU Yu-Ling and YANG Ying-Jie2018,29(5):1213-1229 [Abstract(3727)] [View PDF(5330)1.90 M]Method for Automated Detection of Suspicious Vulnerability Related to Numerical StabilitySHEN Wei-Jun, TANG En-Yi, CHEN Zhen-Yu, CHEN Xin, LI Bin and ZHAI Juan2018,29(5):1230-1243 [Abstract(3843)] [View PDF(4488)1.57 M]Incremental Resource Leak Detection for Large Scale Source CodeGAO Zhi-Wei, JI Wei-Xing, SHI Jian-Jun, WANG Yi-Zhuo, GAO Yu-Jin, LIAO Xin-Yi, LUO Hui and SHI Feng2018,29(5):1244-1257 [Abstract(3124)] [View PDF(3948)1.71 M]Programmable Fuzzing TechnologyYANG Mei-Fang, HUO Wei, ZOU Yan-Yan, YIN Jia-Wei, LIU Bao-Xu, GONG Xiao-Rui, JIA Xiao-Qi and ZOU Wei2018,29(5):1258-1274 [Abstract(4599)] [View PDF(7260)2.12 M]Browser Fuzzing Technique Based on Pattern-GenerationHUO Wei, DAI Ge, SHI Ji, GONG Xiao-Rui, JIA Xiao-Qi, SONG Zhen-Yu, LIU Bao-Xu and ZOU Wei2018,29(5):1275-1287 [Abstract(3866)] [View PDF(5529)1.38 M]Real Time Idle State Decection Method in Fuzzing Test in GUI ProgramZHANG Xing, FENG Chao, LEI Jing and TANG Chao-Jing2018,29(5):1288-1302 [Abstract(3761)] [View PDF(4170)1.69 M]Vulnerability Discovery Method for Virtualization in IaaS Based on Self-Adapting Fuzzing TestSHA Le-Tian, XIAO Fu, YANG Hong-Ke, YU Hui and WANG Ru-Chuan2018,29(5):1303-1317 [Abstract(4228)] [View PDF(4747)1.57 M]Security Reinforcement of Accessibility Service Based on Decentralized Information Flow ControlLI Xiao-Juan and CHEN Hai-Bo2018,29(5):1318-1332 [Abstract(3275)] [View PDF(3928)1.64 M]Transparent Protection of Kernel Module Against ROP with Intel Processor TraceWANG Xin-Ran, LIU Yu-Tao and CHEN Hai-Bo2018,29(5):1333-1347 [Abstract(3431)] [View PDF(4385)1.77 M]Security Detection Model of BlockchainYE Cong-Cong, LI Guo-Qiang, CAI Hong-Ming and GU Yong-Gen2018,29(5):1348-1359 [Abstract(5686)] [View PDF(7446)1.29 M]Security and Safety Threat Detection Method for Unmanned Aerial System Based on Runtime VerificationYANG Dong, SHI Hao, DONG Wei, LIU Zong-Lin and ZHOU Ge2018,29(5):1360-1378 [Abstract(3900)] [View PDF(4950)2.42 M]Security Analysis of the Third-Party SDKs in the Android EcosystemMA Kai and GUO Shan-Qing2018,29(5):1379-1391 [Abstract(4147)] [View PDF(7094)1.65 M]Mobile Advertising Loophole Attack Technology Based on Host APP's PermissionsWANG Chi-Heng, CHEN Jing, SU Han, HE Kun and DU Rui-Ying2018,29(5):1392-1409 [Abstract(3385)] [View PDF(4563)2.12 M]Web Page Trojan Detection Method Based on Dynamic Behavior AnalysisZHANG Wei-Feng, LIU Rui-Cheng and XU Lei2018,29(5):1410-1421 [Abstract(3579)] [View PDF(5366)1.29 M]
Investigation of Empirical Researches in Software EngineeringZHANG Li, PU Meng-Yuan, LIU Yi-Jun, TIAN Jia-Hao, YUE Tao and JIANG Jing2018,29(5):1422-1450 [Abstract(5469)] [View PDF(10395)7.21 M]Survey on Medical Image Computer Aided Detection and Diagnosis SystemsZHENG Guang-Yuan, LIU Xia-Bi and HAN Guang-Hui2018,29(5):1471-1514 [Abstract(5808)] [View PDF(31121)4.38 M]