参考文献
|
-
http://www.eweek.com/c/a/Application-Development/75-of-Developers-Using-HTML5-Survey-508096
-
https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks.
-
Abdulla, P. A.,Atig, M. F.,Chen, Y. F.,Holík, L.,Rezine, Ahmed,Rümmer, Philipp,Stenman, Jari(2014).String constraints for verification.CAV
-
Buchi, J. R.,Senger, S.(1988).Definability in the existential theory of concate- nation and undecidable extensions of this theory.Z. Math. Logik Grundlagen Math.
-
D'Silva, V.,Kroening, D.,Weissenbacher, G.(2008).A Survey of Automated Techniques for Formal Software Verification.IEEE Trans. on CAD of Integrated Circuits and Systems,27(7),1165-1178.
-
Ganesh, V.,Minnes, M.,Solar-Lezama, A.,Rinard, M.(2013).Word equations with length constraints: Whats decidable?.Hardware and Software: Verification and Testing
-
Jin, X.,Hu, X.,Ying, K.,Du, W.,Yin, H.,Peri, G. N.(2014).Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation.Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14).
-
Makanin, G.S.(1977).The problem of solvability of equations in a free semigroup.Mathematics of the USSR-Sbornik,32(2),129-198.
-
Moura, L. D.,Bjorner, N.(2008).Z3: An efficient SMT solver. In Proceedings of the Theory and Practice of Software.14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS'08/ETAPS'08
-
Saxena, P,Akhawe, D.,Hanna, S.,Mao, F.,McCamant, S.,Song, D.(2010).A Symbolic Execution Framework for JavaScript.IEEE Symposium on Security and Privacy
-
Zheng, Y.,Zhang, X.,Ganesh, V.(2013).Z3-str: A Z3-based string solver for web a pplication analysis.Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2013,New York, NY, USA:
|