共 6 条
- [1] Mitigating Use-After-Free Attack using Library Considering Size and Number of Freed Memory [J]. 2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 398 - 404
- [2] Mitigating Use-After-Free Attacks Using Memory-Reuse-Prohibited Library [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (10): : 2295 - 2306
- [3] Preventing Use-After-Free Attacks with Fast Forward Allocation [J]. PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 2453 - 2470
- [4] HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities [J]. 36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 454 - 465
- [5] Refining Use-after-free Defense: Eliminating Dangling Pointers in Registers and Memory [J]. PROCEEDINGS OF THE 2023 30TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, APSEC 2023, 2023, : 493 - 502