参考文献/References:
[1] KUHN R,JOHNSON C.Vulnerability trends: Measuring progress[J].IT Professional,2010,12(4):51-53.
[2] 史飞悦,傅德胜.缓冲区溢出漏洞挖掘分析及利用的研究[J].计算机科学,2013,40(11):143-146.
[3] 陈恺,冯登国,苏璞睿.基于有限约束满足问题的溢出漏洞动态检测方法[J].计算机学报,2012,35(5):898-909.
[4] 高志伟,姚尧,饶飞,等.基于漏洞严重程度分类的漏洞预测模型[J].电子学报,2013,41(9):1784-1787.
[5] Microsoft Corporation.Rich Text Format(RTF)Specification[EB/OL].[2014-10-08] .http://msdn.microsoft.com/en-us/library/aa140277(office.10).aspx.
[6] 李毅超,刘丹,韩宏,等.缓冲区溢出漏洞研究与进展[J].计算机科学,2008,35(1):87-90.
[7] CHANG Yung-yu,ZAVARSKY P,RUHL R,et al.Trend analysis of the CVE for software vulnerability management[C]//Proceedings of IEEE Third International Conference on Privacy, Security, Risk and Trust(PASSAT)and IEEE Third Inernational Conference on Social Computing(SocialCom).Boston:Institute of Electrical and Electronic Engineers,2011:1290-1293.
[8] HUANG Shih-Kun,HUANG Min-Hsiang,HUANG Po-Yen,et al.Software crash analysis for automatic exploit generation on binary programs[J].IEEE Transactions on Reliability,2014,63(1):270,289.
[9] 葛毅,茅兵,谢立.基于内存更新记录的漏洞攻击错误定位方法[J].计算机科学,2009,36(1):253-256.
[10] FATAUER T S,KHATTAB S,OMARA F A.OverCovert: Using stack-overflow software vulnerability to create a covert channel[C]//Proceedings of IEEE 4th IFIP International Conference on New Technologies, Mobility and Security.Paris:Institute of Electrical and Electronic Engineers,2011:1-5.
[11] AN Zhi-yuan,LIU Hai-yan.Locating the address of local variables to achieve a buffer overflow[C]//Proceedings of IEEE Fifth International Conference on Computational and Information Sciences.Shiyang:IEEE Press,2013:1999-2002.
[12] 罗文华.基于逆向技术的恶意程序分析方法[J].计算机应用,2011,31(11):2766-2769.
相似文献/References:
[1]谢维波.医疗门诊业务流程的办公自动化[J].华侨大学学报(自然科学版),2002,23(1):100.[doi:10.3969/j.issn.1000-5013.2002.01.022]
Xie Weibo.Office Automation Given to the Workflow of Outpatient Service in Medical Treatment[J].Journal of Huaqiao University(Natural Science),2002,23(1):100.[doi:10.3969/j.issn.1000-5013.2002.01.022]