메뉴 건너뛰기




Volumn , Issue , 2012, Pages 48-62

ReDeBug: Finding unpatched code clones in entire OS distributions

Author keywords

debug; scalability; unpatched code clone

Indexed keywords

C++ (PROGRAMMING LANGUAGE); CODES (SYMBOLS); LINUX;

EID: 84872099143     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2012.13     Document Type: Conference Paper
Times cited : (231)

References (29)
  • 1
    • 85175130249 scopus 로고    scopus 로고
    • Page checked 3/4
    • Code Assurance. http://patterninsight.com/products/code-assurance/. Page checked 3/4/2012.
    • (2012) Code Assurance
  • 2
    • 85175132134 scopus 로고    scopus 로고
    • Page checked 3/4
    • Pittsburgh Supercomputing Center. http://www.psc.edu/. Page checked 3/4/2012.
    • (2012)
  • 3
    • 85175129818 scopus 로고    scopus 로고
    • Page checked 3/4
    • QuickLZ. http://www.quicklz.com/. Page checked 3/4/2012.
    • (2012)
  • 4
    • 85175134224 scopus 로고    scopus 로고
    • Page checked 3/4
    • SimMetrics. http://sourceforge.net/projects/simmetrics/. Page checked 3/4/2012.
    • (2012) SimMetrics
  • 6
    • 85175134507 scopus 로고    scopus 로고
    • Page checked 3/4
    • Daniel Bernstein. http://www.cse.yorku.ca/∼oz/hash.html. Page checked 3/4/2012.
    • (2012)
    • Bernstein, D.1
  • 9
    • 70450232823 scopus 로고    scopus 로고
    • Network applications of bloom filters: A survey
    • Andrei Broder and Michael Mitzenmacher. Network applications of bloom filters: A survey. Internet Mathematics, 1(4):485-509, 2005.
    • (2005) Internet Mathematics , vol.1 , Issue.4 , pp. 485-509
    • Broder, A.1    Mitzenmacher, M.2
  • 11
    • 48449091474 scopus 로고    scopus 로고
    • A polynomial nominal unification algorithm
    • Christophe Calvès and Maribel Fernández. A polynomial nominal unification algorithm. Theoretical Computer Science, 403:285-306, 2008.
    • (2008) Theoretical Computer Science , vol.403 , pp. 285-306
    • Calvès, C.1    Fernández, M.2
  • 13
    • 59449108823 scopus 로고    scopus 로고
    • CVE-2008-0928. Page checked 3/4
    • National Vulnerability Database. CVE-2008-0928. http://web.nvd.nist.gov/ view/vuln/detail?vulnId=CVE-2008-0928. Page checked 3/4/2012.
    • (2012) National Vulnerability Database
  • 14
    • 59449108823 scopus 로고    scopus 로고
    • CVE-2009-3720. Page checked 3/4
    • National Vulnerability Database. CVE-2009-3720. http://web.nvd.nist.gov/ view/vuln/detail?vulnId=CVE-2009-3720. Page checked 3/4/2012.
    • (2012) National Vulnerability Database
  • 15
    • 59449108823 scopus 로고    scopus 로고
    • CVE-2010-0405. Page checked 3/4
    • National Vulnerability Database. CVE-2010-0405. http://web.nvd.nist.gov/ view/vuln/detail?vulnId=CVE-2010-0405. Page checked 3/4/2012.
    • (2012) National Vulnerability Database
  • 16
    • 59449108823 scopus 로고    scopus 로고
    • CVE-2011-1092. Page checked 3/4
    • National Vulnerability Database. CVE-2011-1092. http://web.nvd.nist.gov/ view/vuln/detail?vulnId=CVE-2011-1092. Page checked 3/4/2012.
    • (2012) National Vulnerability Database
  • 17
    • 59449108823 scopus 로고    scopus 로고
    • CVE-2011-1782. Page checked 3/4
    • National Vulnerability Database. CVE-2011-1782. http://web.nvd.nist.gov/ view/vuln/detail?vulnId=CVE-2011-1782. Page checked 3/4/2012.
    • (2012) National Vulnerability Database
  • 18
    • 59449108823 scopus 로고    scopus 로고
    • CVE-2011-3200. Page checked 3/4
    • National Vulnerability Database. CVE-2011-3200. http://web.nvd.nist.gov/ view/vuln/detail?vulnId=CVE-2011-3200. Page checked 3/4/2012.
    • (2012) National Vulnerability Database
  • 19
    • 59449108823 scopus 로고    scopus 로고
    • CVE-2011-3368. Page checked 3/4
    • National Vulnerability Database. CVE-2011-3368. http://web.nvd.nist.gov/ view/vuln/detail?vulnId=CVE-2011-3368. Page checked 3/4/2012.
    • (2012) National Vulnerability Database
  • 20
    • 59449108823 scopus 로고    scopus 로고
    • CVE-2011-3872. Page checked 3/4
    • National Vulnerability Database. CVE-2011-3872. http://web.nvd.nist.gov/ view/vuln/detail?vulnId=CVE-2011-3872. Page checked 3/4/2012.
    • (2012) National Vulnerability Database
  • 24
    • 0036648690 scopus 로고    scopus 로고
    • CCFinder: A multilinguistic token-based code clone detection system for large scale source code
    • Toshihiro Kamiya, Shinji Kusumoto, and Katsuro Inoue. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Transactions on Software Engineering, 28(7):654-670, 2002.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , Issue.7 , pp. 654-670
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 25
    • 33645819206 scopus 로고    scopus 로고
    • CP-Miner: Finding copy-paste and related bugs in large-scale software code
    • Zhenmin Li, Shan Lu, Suvda Myagmar, and Yuanyuan Zhou. CP-Miner: finding copy-paste and related bugs in large-scale software code. IEEE Transactions on Software Engineering, 32:176-192, 2006.
    • (2006) IEEE Transactions on Software Engineering , vol.32 , pp. 176-192
    • Li, Z.1    Lu, S.2    Myagmar, S.3    Zhou, Y.4
  • 27
    • 85175133125 scopus 로고    scopus 로고
    • CVE-2011-3145. Page checked 3/4
    • Ubuntu Security Notice. CVE-2011-3145. http://www.ubuntu.com/usn/usn- 1196-1/. Page checked 3/4/2012.
    • (2012) Ubuntu Security Notice


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.