A Survey of Software Dynamic Analysis Methods
-
Published:2024-02
Issue:1
Volume:50
Page:90-114
-
ISSN:0361-7688
-
Container-title:Programming and Computer Software
-
language:en
-
Short-container-title:Program Comput Soft
Publisher
Pleiades Publishing Ltd
Reference226 articles.
1. Ozkan-Okay, M., Samet, R., Aslan, Ö., and Gupta, D., A comprehensive systematic literature review on intrusion detection systems, IEEE Access, 2021, vol. 9, pp. 157727–157760. https://doi.org/10.1109/ACCESS.2021.3129336 2. Santos, L., Rabadao, C., and Gonçalves, R., Intrusion detection systems in Internet of Things: A literature review, Proc. of 13th Iberian Conference on Information Systems and Technologies (CISTI), Caceres, Spain, 2018, pp. 1–7. https://doi.org/10.23919/CISTI.2018.8399291 3. Zhu, H., Hall, P. A. V., and May, J. H. R., Software unit test coverage and adequacy, ACM Computing Surveys, 1997, vol. 29, no. 4, pp. 366–427. https://doi.org/10.1145/267580.267590 4. Sutton, M., Greene, A., and Amini, P., Fuzzing: Brute Force Vulnerability Discovery, Boston: Addison-Wesley, 2007. 5. Newsome, J., and Song, D., Dynamic taint analysis for Automatic detection, analysis, and signature generation of exploits on commodity software, Proc. of Network and Distributed System Security Simposium, 2005. https://doi.org/10.1184/R1/6468716.v1
|
|