Abstract
In the current cyberspace, vulnerability has attracted the widespread attention. This paper briefly introduces the typical software vulnerability mining techniques. Based on the existing research work, this paper puts forward the whole idea of the research on the vulnerability mining technology of software in the future, and then makes some research on some key points and key technologies respectively. In this paper, a brief study of the software vulnerability mining technology is given, which is helpful to carry out the follow-up research work.
Cite
CITATION STYLE
Lin, D., Wu, X., Wu, Q., Liu, Y., Zeng, J., & Tan, J. (2019). A Survey of the Key Technology of Software Vulnerability Mining. In Journal of Physics: Conference Series (Vol. 1187). Institute of Physics Publishing. https://doi.org/10.1088/1742-6596/1187/5/052031
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.