咨询与建议

限定检索结果

文献类型

  • 2 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
    • 2 篇 软件工程
    • 1 篇 电气工程
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 3 篇 code static anal...
  • 1 篇 collusion attack
  • 1 篇 patch analysis
  • 1 篇 binarycode analy...
  • 1 篇 software securit...
  • 1 篇 cve clone detect...
  • 1 篇 privacy leak
  • 1 篇 code clones
  • 1 篇 android app
  • 1 篇 fragment clone d...

机构

  • 1 篇 russian armenian...
  • 1 篇 henan key labora...
  • 1 篇 ministry of educ...
  • 1 篇 lomonosov moscow...
  • 1 篇 russian acad sci...
  • 1 篇 ras ivannikov in...
  • 1 篇 russian armenian...

作者

  • 2 篇 aslanyan hayk
  • 2 篇 arutunian mariam
  • 1 篇 gaissaryan serge...
  • 1 篇 kurmangaleev sha...
  • 1 篇 avetisyan arutyu...
  • 1 篇 luo xiangyang
  • 1 篇 guan qinchen
  • 1 篇 mkrtchyan albert
  • 1 篇 wang kerong
  • 1 篇 khroyan garnik
  • 1 篇 hovhannisyan hri...
  • 1 篇 sargsyan sevak
  • 1 篇 vardanyan vahagn
  • 1 篇 du shaoyong
  • 1 篇 yang chunfang
  • 1 篇 sirunyan vahagn
  • 1 篇 movsisyan hovhan...

语言

  • 2 篇 英文
  • 1 篇 其他
检索条件"主题词=Code static analysis"
3 条 记 录,以下是1-10 订阅
排序:
Accurate code fragment clone detection and its application in identifying known CVE clones
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2025年 第1期24卷 1-14页
作者: Arutunian, Mariam Sargsyan, Sevak Hovhannisyan, Hripsime Khroyan, Garnik Mkrtchyan, Albert Movsisyan, Hovhannes Avetisyan, Arutyun Aslanyan, Hayk Russian Armenian Univ Ctr Adv Software Technol Yerevan 0051 Armenia RAS Ivannikov Inst Syst Programming Moscow 109004 Russia
This article presents a novel method for detecting copied code fragments called clones, which is then utilized to identify known common vulnerabilities and exposures copies. The proposed method is versatile and applic... 详细信息
来源: 评论
A Framework for Detecting Hidden Partners in App Collusion  23
A Framework for Detecting Hidden Partners in App Collusion
收藏 引用
23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024
作者: Guan, Qinchen Du, Shaoyong Wang, Kerong Yang, Chunfang Luo, Xiangyang Henan Key Laboratory of Cyberspace Situation Awareness Zhengzhou China Ministry of Education Key Laboratory of Cyberspace Security Zhengzhou China
Nowadays, in Android ecosystem, to bypass current malware detections, adversaries often distribute the malicious and sensitive functions into different apps. These apps collude to conduct some malicious activities, su... 详细信息
来源: 评论
analysis of Program Patches Nature and Searching for Unpatched code Fragments
Analysis of Program Patches Nature and Searching for Unpatch...
收藏 引用
Ivannikov Memorial Workshop (IVMEM)
作者: Arutunian, Mariam Aslanyan, Hayk Vardanyan, Vahagn Sirunyan, Vahagn Kurmangaleev, Shamil Gaissaryan, Sergey Russian Armenian Univ Russian Acad Sci Ivannikov Inst Syst Programming Yerevan Armenia Russian Acad Sci Ivannikov Inst Syst Programming Yerevan Armenia Lomonosov Moscow State Univ Yerevan Russian Acad Sci Ivannikov Inst Syst Programming Yerevan Armenia
Software developers often copy and paste code within a project. Due to the possible existence of defects in the initial code fragment, this can lead to defects propagation across the project. Software changes in new v... 详细信息
来源: 评论