8Kiriansky V, Bruening D, Amarasinghe S. Secure execution via program shepherding [ C ]//Proceedings of the 11 th USENIX security symposium. [ s. 1. ] : USENIX ,2002 : 191-206.
9Abadi M ,Budiu M, Erlingsson U ,et al. Control-flow integrity principles, implementations, and applications [ J ]. ACM Trans- actions on Information and System Security ,2009,13 ( 1 ) : 1 - 40.
10Shu G, Rana O F, Avis N J, et al. Ontology-based semantic matchmaking approach [ J ]. Advances in Engineering Soft- ware ,2007,38( 1 ) :59-67.