共 50 条
- [1] Detecting Concurrency Memory Corruption Vulnerabilities ESEC/FSE'2019: PROCEEDINGS OF THE 2019 27TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2019, : 706 - 717
- [2] A Comprehensive Detection of Memory Corruption Vulnerabilities for C/C plus plus Programs 2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS, 2018, : 354 - 360
- [3] MemSherlock: An Automated Debugger for Unknown Memory Corruption Vulnerabilities CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 562 - +
- [4] Memory Corruption Vulnerabilities Detection for Android Binary Software 2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2015, : 16 - 20
- [5] Research on Discovering Memory Corruption Vulnerabilities for Embedded CGIs Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2020, 49 (05): : 745 - 750
- [6] Probabilistic Concurrency Testing forWeak Memory Programs PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS, VOL 2, ASPLOS 2023, 2023, : 603 - 616
- [8] Detecting Concurrency Vulnerabilities Based on Partial Orders of Memory and Thread Events PROCEEDINGS OF THE 29TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '21), 2021, : 280 - 291
- [9] When Learning Met Memory CANADIAN JOURNAL OF EXPERIMENTAL PSYCHOLOGY-REVUE CANADIENNE DE PSYCHOLOGIE EXPERIMENTALE, 2010, 64 (04): : 227 - 240
- [10] TEEREX: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 841 - 858