共 50 条
- [31] An Efficient Metric-Based Approach for Static Use-After-Free Detection 2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 58 - 65
- [32] MarkUs: Drop-in use-after-free prevention for low-level languages 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 578 - 591
- [34] Mpchecker: Use-After-Free Vulnerabilities Protection Based on Multi-Level Pointers IEEE ACCESS, 2019, 7 : 45961 - 45977
- [35] Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection 33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 42 - 54
- [36] All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability PROCEEDINGS OF THE 26TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2023, 2023, : 623 - 638
- [37] Effective Static Analysis of Concurrency Use-After-Free Bugs in Linux Device Drivers PROCEEDINGS OF THE 2019 USENIX ANNUAL TECHNICAL CONFERENCE, 2019, : 255 - 268
- [38] Mitigating Use-After-Free Attacks Using Memory-Reuse-Prohibited Library IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (10): : 2295 - 2306
- [39] HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 219 - 234
- [40] xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022), 2022, : 502 - 519