A Vulnerability Mining Method for the Internet of Things Driven by Pointer Analysis Technology
Network Communication and Information Security|更新时间:2025-04-10
|
A Vulnerability Mining Method for the Internet of Things Driven by Pointer Analysis Technology
“In the field of IoT vulnerability mining, experts have established an automated framework based on pointer analysis, significantly improving vulnerability detection rates and time efficiency.”
SHI Qiliang,SHA Letian,PAN Jiaye.A Vulnerability Mining Method for the Internet of Things Driven by Pointer Analysis Technology[J].Software Guide,2025,24(03):109-118.
SHI Qiliang,SHA Letian,PAN Jiaye.A Vulnerability Mining Method for the Internet of Things Driven by Pointer Analysis Technology[J].Software Guide,2025,24(03):109-118. DOI: 10.11907/rjdk.241264.
A Vulnerability Mining Method for the Internet of Things Driven by Pointer Analysis Technology