Page 306 - 《软件学报》2021年第6期
P. 306
1880 Journal of Software 软件学报 Vol.32, No.6, June 2021
References:
[1] Zhang JW, Zhang LW, Hu Y. Open Source Robot Operating System-ROS. Beijing: Science Press, 2012. 1−4 (in Chinese).
[2] Quigley M, Gerkey BP, Conley K, Faust J, Ng AY. ROS: An open-source robot operating system. In: Proc. of the ICRA Workshop
on Open Source Software. Piscataway: IEEE, 2009. 1−6.
[3] Liu RJ, Wang F, Zhang Q. ROS based trajectory planning of robotic arm. Navigation, Positioning and Timing, 2016,3(6):16−24 (in
Chinese with English abstract). [doi: 10.19306/j.cnki.2095-8110.2016.06.016]
[4] Bertolino A. Software testing research: Achievements, challenges, dreams. In: Matthew D, James H, eds. Proc. of the Future of
Software Engineering (FOSE 2007). IEEE, 2007. 85−103. [doi: 10.1109/FOSE.2007.25]
[5] Chen W. Research on vulnerability detection technology in static analysis of Java Programs [MS. Thesis]. Beijing: Beijing
University of Posts and Telecommunications, 2018 (in Chinese with English abstract).
[6] Zhu YF, Li LJ. Security vulnerability and discussion on CVE standard. In: Proc. of the 19th National Conf. on New Computer
Technology and Computer Education. Chengdu: Southwest Jiaotong University Press, 2008. 577−580 (in Chinese with English
abstract).
[7] Dai LC, Zhang YR, Li FZ. A brief analysis of traditional software testing methods. Science and Technology Wind, 2011,(16):
136−137 (in Chinese with English abstract). [doi: 10.3969/j.issn.1671-7341.2011.16.118]
[8] Sutton M, Greene A, Amini P. Fuzzing: Brute Force Vulnerability Discovery. Beijing: Machinery Industry Press, 2007. 29−41.
[9] Li H, Zhang C, Yang X. Survey of OS kernel fuzzing. Journal of Chinese Computer Systems, 2019,40(9):1994−1999 (in Chinese
with English abstract). [doi: CNKI:SUN:XXWX.0.2019-09-033]
[10] Mao DD, Ye XJ, Xie Feng, et al. Automata based database management system vulnerability mining. In: Proc. of the Information
Security Vulnerability Analysis and Risk Assessment Conf. Beijing: China Information Security Assessment Center, Tsinghua
University. 2011. 98−108 (in Chinese with English abstract).
[11] Da XW, Wang XC, Chen ZH. Web application vulnerability mining method based on improved fuzzy testing. Computers and
Modernization, 2016,(8):100−104 (in Chinese with English abstract). [doi: 10.3969/j.issn.1006-2475.2016.08.021]
[12] Fu ML, Wu LF, Hong Z. Research on intelligent contract security vulnerability mining technology. Computer Applications, 2019,
39(7):1959−1966 (in Chinese with English abstract). [doi: 10,11772/j. issn. 1001-9081.2019010082]
[13] Gao J, Xu YW, Jiang Y, Liu Z, Chang WL, Jiao X, Sun JG. EM-Fuzz: Augmented firmware fuzzing via memory checking. IEEE
Trans. on Computer-Aided Design of Integrated Circuits and Systems. Circuits Syst., 2020,39(11):3420−3432.
[14] Fu Y, Ren M, Ma F. EVMFuzzer: Detect EVM vulnerabilities via fuzz testing. In: Marlon D, Dietmar P, eds. Proc. of the 2019 27th
ACM Joint Meeting on European Software Engineering Conf. and Symp. on the Foundations of Software Engineering. New York:
Association for Computing Machinery, 2019. 1110−1114. [doi: 10.1145/3338906.3341175]
[15] Sun Y, Zhang S. Research and implementation of key technologies of service robots based on ROS. Software, 2019,40(11):
186−190, 194 (in Chinese with English abstract). [doi: 10.3969/j.issn.1003-6970.2019.11.042]
[16] Bai CC, Cheng WY, Guo HT. Brief analysis of open source ROS robot operating system. Science and Information Technology,
2019,(36):2 (in Chinese with English abstract).
[17] Guo J, Jiang Y, Zhao Y, Chen Q, Sun JG. DLFuzz: Differential fuzzing testing of deep learning systems. In: Proc. of the 26th ACM
SIGSOFT Int’l Symp. on Foundations of Software Engineering (FSE). New York: Association for Computing Machinery, 2018.
4−9. [doi: 10.1145/3236024.3264835]
[18] Dolan RJ, Matthews JM. Maximizing the utility of customer product testing: Beta test design and management. Journal of Product
Innovation Management, 2010,10(4):318−330. [doi: 10.1111/1540-5885.1040318]
附中文参考文献:
[1] 张建伟,张立伟,胡颖.开源机器人操作系统——ROS.北京:科学出版社,2012.1−4.
[3] 刘汝佳,王芳,张强.基于 ROS 的机械臂轨迹规划研究.导航定位与授时,2016,3(6):16−24. [doi: 10.19306/j.cnki.2095-8110.2016.06.
016]
[5] 陈玮.Java 程序静态分析中的漏洞检测技术研究[硕士学位论文].北京:北京邮电大学,2018.
[6] 朱一枫,李玲娟.安全漏洞问题及 CVE 标准的探讨.见:第 19 届全国计算机新科技与计算机教育学术大会论文集.成都:西南交通
大学出版社,2008.577−580.