Tài liệu tham khảo |
Loại |
Chi tiết |
6. Aleph One. Smashing the stack for fun and profit. Phrack Magazine, 7(49):File 14, 1996 |
Sách, tạp chí |
|
7. Matt Bishop. Vulnerability analysis: An extended abstract. In Recent Advances in Intrusion Detection, 1999 |
Sách, tạp chí |
Tiêu đề: |
Recent Advances"in Intrusion Detection |
|
15. Nurit Dor, Michael Rodeh, and Mooly Sagiv. Cleanness checking of string manipulations in C programs via integer analysis. Lecture Notes in Computer Science, 2126, 2001 |
Sách, tạp chí |
Tiêu đề: |
Lecture Notes in Computer"Science |
|
16. Alastair Dunsmore, Marc Roper, and Murray Wood. The Development and Evaluation of Three Diverse Techniques for Object-Oriented Code Inspection.IEEE Transactions on Software Engineering, 29(8), 2003 |
Sách, tạp chí |
Tiêu đề: |
IEEE Transactions on Software Engineering |
|
18. Carl Ellison and Bruce Schneier. Ten risks of PKI: What you’re not being told about Public Key Infrastructure. Computer Security Journal, 16(1):1–7, 2000 |
Sách, tạp chí |
Tiêu đề: |
Computer Security Journal |
|
19. M. E. Fagan. Design and Code Inspections to Reduce Errors in Program De- velopment. IBM Systems Journal, 15(3), 1976 |
Sách, tạp chí |
Tiêu đề: |
IBM Systems Journal |
|
20. George Fink and Matt Bishop. Property-based testing: a new approach to testing for assurance. SIGSOFT Softw. Eng. Notes, 22(4):74–80, 1997 |
Sách, tạp chí |
Tiêu đề: |
SIGSOFT Softw. Eng. Notes |
|
21. C´ edric Fournet and Andrew D. Gordon. Stack inspection: theory and variants.In Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 307–318. ACM Press, 2002 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles"of programming languages |
|
25. J. Gosling, B. Joy, G. Steele, and G. Bracha. The Java Language Specification Second Edition. The Java Series. Addison-Wesley, Boston, MA, 2000 |
Sách, tạp chí |
Tiêu đề: |
The Java Language Specification"Second Edition |
|
28. E. Haugh and M. Bishop. Testing C programs for buffer overflow vulnerabilities.In Proceedings of the 2003 Symposium on Networked and Distributed System Security, February 2003 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the 2003 Symposium on Networked and Distributed System"Security |
|
32. Wassim Itani and Ayman Kayssi. J2me application-layer end-to-end security for m-commerce. Journal of Network and Computer Applications, 27(1):13–32, January 2004 |
Sách, tạp chí |
Tiêu đề: |
Journal of Network and Computer Applications |
|
39. J. Knudsen. Wireless Java: developing with Java 2, micro edition, Second Edition. Books for professionals by professionals. Springer-Verlag, February 2003 |
Sách, tạp chí |
Tiêu đề: |
Wireless Java: developing with Java 2, micro edition, Second"Edition |
|
41. O. Kolsi and T. Virtanen. MIDP 2.0 security enhancements. In Proceed- ings of the 37th Annual Hawaii International Conference on System Sciences (HICSS’04), 2004 |
Sách, tạp chí |
Tiêu đề: |
Proceed-"ings of the 37th Annual Hawaii International Conference on System Sciences"(HICSS’04) |
|
44. Sheng Liang. Java Native Interface: Programmer’s Guide and Specification.Addison-Wesley, Reading, MA, USA, 1999 |
Sách, tạp chí |
Tiêu đề: |
Java Native Interface: Programmer’s Guide and Specification |
|
45. Tim Lindholm and Frank Yellin. The Java Virtual Machine Specification.Addison-Wesley Publishing Co., Reading, MA, USA, 2000 |
Sách, tạp chí |
Tiêu đề: |
The Java Virtual Machine Specification |
|
63. Roger Riggs, Anteno Taivalsaari, Jim Van Peursem, Jyri Huopaniemi, Mark Patel, and Aleksi Uotila. Programming Wireless Devices with the Java 2 Plat- form Micro Edition (Second Edition). Reading, MA, USA |
Sách, tạp chí |
Tiêu đề: |
Programming Wireless Devices with the Java 2 Plat-"form Micro Edition (Second Edition) |
|
67. N. Shaylor. A Just-in-Time Compiler for Memory-Constrained Low-Power De- vices. In Proceedings of the 2nd Java Virtual Machine Research and Technology Symposium, pages 119–126, San Francisco, CA, USA, August 2002 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the 2nd Java Virtual Machine Research and Technology"Symposium |
|
76. Herbert H. Thompson, James A. Whittaker, and Florence E. Mottay. Software security vulnerability testing in hostile environments. In SAC ’02: Proceedings of the 2002 ACM symposium on Applied computing, pages 260–264, 2002 |
Sách, tạp chí |
Tiêu đề: |
SAC ’02: Proceedings"of the 2002 ACM symposium on Applied computing |
|
78. John Viega, J. T. Bloch, Tadayoshi Kohno, and Gary McGraw. ITS4: A static vulnerability scanner for C and C++ code. In 16th Annual Computer Security Applications Conference, 2000 |
Sách, tạp chí |
Tiêu đề: |
16th Annual Computer Security"Applications Conference |
|
79. John Viega, Tom Mutdosch, Gary McGraw, and Edward W. Felten. Statically scanning Java code: Finding security vulnerabilities. j-IEEE-SOFTWARE, 17(5):68–74, September/October 2000 |
Sách, tạp chí |
|