相似文献/References:
[1]马凯,蔡皖东,姚烨.Web2.0环境下SQL注入漏洞注入点提取方法[J].计算机技术与发展,2013,(03):121.
MA Kai,CAI Wan-dong,YAO Ye.Injection Point Extraction Approach in SQL Injection Vulnerability under Web2. 0 Environment[J].,2013,(03):121.
[2]陈春玲,张凡,余瀚.Web应用程序漏洞检测系统设计[J].计算机技术与发展,2017,27(09):101.
CHEN Chun-ling,ZHANG Fan,YU Han. Design of Vulnerability Detection System for Web Application Program[J].,2017,27(03):101.
[3]傅紫薇,沈子牛,陈云芳,等.以太坊智能合约的漏洞自动化修复技术研究[J].计算机技术与发展,2023,33(02):110.[doi:10. 3969 / j. issn. 1673-629X. 2023. 02. 017]
FU Zi-wei,SHEN Zi-niu,CHEN Yun-fang,et al.Research on Automatic Vulnerability Repair Technology of Smart Contracts on Ethereum[J].,2023,33(03):110.[doi:10. 3969 / j. issn. 1673-629X. 2023. 02. 017]
[4]胡 飞,陈 昊,王 媛,等.基于图网络的 Java 反序列化漏洞检测方法[J].计算机技术与发展,2023,33(05):122.[doi:10. 3969 / j. issn. 1673-629X. 2023. 05. 019]
HU Fei,CHEN Hao,WANG Yuan,et al.Call Chain Detection Method for Java Deserialization Vulnerability Based on Graph Network[J].,2023,33(03):122.[doi:10. 3969 / j. issn. 1673-629X. 2023. 05. 019]
[5]熊可欣,李 涛*,余 琴,等.PDGcross:基于跨文件图表征的源代码漏洞检测[J].计算机技术与发展,2023,33(08):102.[doi:10. 3969 / j. issn. 1673-629X. 2023. 08. 015]
XIONG Ke-xin,LI Tao*,YU Qin,et al.PDGcross:Source Code Vulnerability Detection Based on Cross-file Graph Representation[J].,2023,33(03):102.[doi:10. 3969 / j. issn. 1673-629X. 2023. 08. 015]
[6]王 斌,李 峰,杨慧婷,等.Android 应用程序漏洞检测方法和工具新进展[J].计算机技术与发展,2024,34(02):9.[doi:10. 3969 / j. issn. 1673-629X. 2024. 02. 002]
WANG Bin,LI Feng,YANG Hui-ting,et al.Recent Progress on Android Application Vulnerability Detection Methods and Tools[J].,2024,34(03):9.[doi:10. 3969 / j. issn. 1673-629X. 2024. 02. 002]