[1]陈丽娜, 廖璇, 董国豪, 等. 基于供应链第三方开源组件的风险与挑战研究[J]. 软件, 2025, 46(1): 5355[2]ReversingLabs. The 2025 software supply chain security report[EBOL]. ReversingLabs, 2025 [20250715]. https:www.reversinglabs.com[3]张旭明, 史涯晴, 黄松, 等. 开源软件组件漏洞检测与自动修复技术研究综述[J]. 计算机科学, 2025, 52(6): 120[4]Li Zhen, Zou Deqing, Xu Shouhai, et al. VulDeePecker: A deep learningbased system for vulnerability detection[C] Proc of the 25th Annual Network and Distributed System Security Symp(NDSS). San Diego, CA: Internet Society, 2018: 115[5]Li Z, Zou D, Xu S, et al. VulDeeLocator: A deep learningbased finegrained vulnerability detector[J]. IEEE Trans on Dependable and Secure Computing, 2022, 19(4): 28212837[6]段斌, 李兰, 赖俊, 等. 基于动态污点分析的工控设备硬件漏洞挖掘方法研究[J]. 信息网络安全, 2019 (4): 4754[7]Song D, Brumley D, Yin H, et al. BitBlaze: A New Approach to Computer Security via Binary Analysis[M]. Berlin: Springer, 2008[8]Enck W, Gilbert P, Han S, et al. TaintDroid: An informationflow tracking system for realtime privacy monitoring on smartphones[J]. ACM Trans on Computer Systems, 2014, 32(2): 129[9]黄正聪. 基于脆弱点定位的固件漏洞检测系统的设计与实现[D]. 哈尔滨: 哈尔滨工业大学, 2022[10]姜慧. 基于攻击路径的全局漏洞检测[D]. 青岛: 中国海洋大学, 2016 |