[1] |
Junko Y.Toyota case:Single bit flip that killed[EB/OL].[2013-10-25].https://www.eetimes.com/toyota-case-single-bit-flip-that-killed.
|
[2] |
Yan K,Liu D,Meng F Z.A highly automated binary software vulnerability risk evaluation method for off-by-one stack based buffer overflow[C] ∥Proc of 2015 IEEE International Conference on Computer and Communications,2015:16-20.
|
[3] |
Zhang G,Liu Z.Study on approach of determining size of μC/OS-II task stack[J]. Journal of Computers,2011,6(4):676-682.
|
[4] |
Xie W G,Hu J C,Kudjo P K,et al.A new detection method for stack overflow vulnerability based on component binary code for third-party component[C]∥Proc of 2018 IEEE SmartWorld,Ubiquitous Intelligence & Computing,Advanced & Trusted Computing,Scalable Computing & Communications,Cloud & Big Data Computing,Internet of People and Smart City Innovation,2018:1255-1259.
|
[5] |
Choi K,Kim S,Seok M G,et al.Maximum stack memory monitoring method assisted by static analysis of the stack usage profile[C]∥Proc of International Conference on Computer Science and its Applications,2018:756-765.
|
[6] |
Yu Quan-xi,Zhang Yi-kun,Hu Yan-jing,et al.Data collection in embedded software path coverage test[J].Computer Engineering,2009,35(21):54-56.(in Chinese)
|
[7] |
Fang L,Takashi K,Do T B N,et al.Formal model-based test for AUTOSAR multicore RTOS[C]∥Proc of 2012 IEEE 5th International Conference on Software Testing,Verification and Validation,2012:251-259.
|
[8] |
Wei Qiang,Hu Ding-wen,Wang Qing-xian.Design and implementation of object code based dynamic testing frame-work[J].Computer Engineering and Applications,2008,44(6):113-116.(in Chinese)
|
[9] |
Li Qian,Mei Lin,Ling Hui,et al.EASTT:An embedded application software test system[J].Computer Engineering & Science,2002,24(2):66-69.(in Chinese)
|
[10] |
Liang Xiao-bing,Kong Ling-da,Liu Yan,et al.Lightweight dynamic binary instrumentation algorithm for embedded software[J].Netinfo Security,2021,21(4):89-95.(in Chinese)
|
[11] |
Khamparia A,Banu J S.Program analysis with dynamic instrumentation pin and performance tools[C]∥Proc of 2013 IEEE International Conference on Emerging Trends in Computing,Communication and Nanotechnology,2013:436-440.
|
[12] |
Zhang Peng,Yang Qiu-hui,Li Hai-nu.Research of memory leak detection method on embedded system[J].Computer Engineering and Applications,2013,49(14):56-59.(in Chinese)
|
|
附中文参考文献:
|
[6] |
于全喜,张毅坤,胡燕京,等.嵌入式软件路径覆盖测试数据采集[J],计算机工程,2009,35(21):54-56.
|
[8] |
魏强,胡定文,王清贤.目标码动态测试框架的设计及实现[J].计算机工程与应用,2008,44(6):113-116.
|
[9] |
李茜,梅琳,凌辉,等.EASTT:一种嵌入式应用软件测试系统[J].计算机工程与科学,2002,24(2):66-69.
|
[10] |
梁晓兵,孔令达,刘岩,等.轻量级嵌入式软件动态二进制插桩算法[J].信息网络安全,2021,21(4):89-95.
|
[12] |
张鹏,杨秋辉,李海怒.嵌入式软件内存泄露检测方法研究[J].计算机工程与应用,2013,49(14):56-59.
|