2CHESS B, McGRAW G. Static analysis for security [ J ]. Security & Privacy Magazine ,2004,2 ( 6 ) :76-79.
3BERGER M, HONDA K, YOSHIDA N. A logical analysis of aliasing for higher-order imperative functions [ C ]//Proc of ICFP' 05. 2005.
4AMTOFT T, BANERJEE A. Information flow analysis in logical form, Technical Report CIS TR 2004-3 [ R ]. [ S. l. ] :Kansas State University, 2004.
5SABELFELD A, MYERS A C. Language-based information-flow security [ J ]. I EEE d Selected Areas in Communications, 2003,21 : 5- 19.
6YONG S H, HORWITZ S. Pointer-range analysis [ C ]//Proc of the 11th International Static Analysis Symposium. Verona, Italy [ s. n. ], 2004:26- 28.
7SUN Qi, BANERJEE A, NAUMANN D A. Modular and constraintbased information flow inference fur an object-oriented language [ C ]//Proc of the 11 th International Static Analysis Symposium. Yeroha, Italy:[s. n. ] ,2004:84-99.
8FLANAGAN C, FREUND S N. Type inference against races[ C ]// Proc of the 11 th International Static: Analysis Symposium. Verona, Italy:[ s. n. ] ,2004:116-132.
9McGRAW G. Software security : building security[ M ]. [ S. l. ] : Addison Wesley Professional,2006.
10WAGNER D,FOSTER J S,BREWER E A,et al. A first step towards automated detection of buffer overrun vulnerabilities [ C ]//Proc of Networking and Distributed System Security Symposium. San Diego, California: [ s. n. ] ,2000.