Automated detection on the security of the linked-list operations

Hongyu KUANG, Jian WANG, Ruilin LI, Chao FENG, YunFei SU, Xing ZHANG

PDF(903 KB)
PDF(903 KB)
Front. Comput. Sci. ›› 2022, Vol. 16 ›› Issue (2) : 162201. DOI: 10.1007/s11704-020-0312-6
LETTER

Automated detection on the security of the linked-list operations

Author information +
History +

Graphical abstract

Cite this article

Download citation ▾
Hongyu KUANG, Jian WANG, Ruilin LI, Chao FENG, YunFei SU, Xing ZHANG. Automated detection on the security of the linked-list operations. Front. Comput. Sci., 2022, 16(2): 162201 https://doi.org/10.1007/s11704-020-0312-6

References

[1]
Dowd M, McDonald J, Schuh J. The art of software security assessment: Identifying and preventing software vulnerabilities. Addison Wesley Professional, 2007
[2]
Liu F , Li G , Hu X . Program Comprehension Based on Deep learning. Journal of Computer Research and Development, 2019, 56( 8): 1605– 1620

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant No. 61702540) and Hunan Provincial Natural Science Foundation of China (Grant No. 2018JJ3615).

RIGHTS & PERMISSIONS

2022 Higher Education Press
AI Summary AI Mindmap
PDF(903 KB)

Accesses

Citations

Detail

Sections
Recommended

/