共 50 条
- [1] Typestate-Guided Fuzzer for Discovering Use-after-Free Vulnerabilities [J]. 2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020), 2020, : 999 - 1010
- [2] Scalable Static Detection of Use-After-Free Vulnerabilities in Binary Code [J]. IEEE ACCESS, 2020, 8 : 78713 - 78725
- [3] HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities [J]. 36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 454 - 465
- [4] POSTER: UAFChecker: Scalable Static Detection of Use-After-Free Vulnerabilities [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1529 - 1531
- [5] From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 414 - 425
- [6] FreeSentry: Protecting Against Use-After-Free Vulnerabilities Due to Dangling Pointers [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
- [7] Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 569 - 576
- [8] FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities [J]. PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 781 - 797
- [9] Mpchecker: Use-After-Free Vulnerabilities Protection Based on Multi-Level Pointers [J]. IEEE ACCESS, 2019, 7 : 45961 - 45977
- [10] All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability [J]. PROCEEDINGS OF THE 26TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2023, 2023, : 623 - 638