References
Dowd M, McDonald J, Schuh J. The art of software security assessment: Identifying and preventing software vulnerabilities. Addison Wesley Professional, 2007
Liu F, Li G, Hu X, et al. Program Comprehension Based on Deep learning. Journal of Computer Research and Development, 2019, 56(8): 1605–1620
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant No. 61702540) and Hunan Provincial Natural Science Foundation of China (Grant No. 2018JJ3615).
Author information
Authors and Affiliations
Corresponding author
Electronic supplementary material
Rights and permissions
About this article
Cite this article
Kuang, H., Wang, J., Li, R. et al. Automated detection on the security of the linked-list operations. Front. Comput. Sci. 16, 162201 (2022). https://doi.org/10.1007/s11704-020-0312-6
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11704-020-0312-6