1. Key Lab of Computer Networks and Information Security of Ministry of Education, Xidian University, Xi'an 710071, China;
2. National Computer Network Intrusion Protection Center, Graduate University of the Chinese Academy of Sciences, Beijing 100049, China
[1] Heffley J, Meunier P. Can source code auditing software identify common vulnerabilities and beused to evaluate software security. In: HICSS 2004. Hawaii, Jan, 2004
[2] Davide Pozza, Luca Durante. Comparing lexical analysis tools for buffer overflow detection in ne-twork software. In: First International Conference on Communication System Software and Middleware(Comsware 2006). 2006.1~7
[3] FlawFinder Home Page. http://www.dwheeler.com/flawfinder/. 2008-6-25
[4] ITS4: A static vulnerability scanner for C and C+ + code. http://www.cigital.com/papers/downlo-ad/its4.pdf. 2008-6-25