共 50 条
- [1] An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (SEC 2022), 2022, 648 : 507 - 523
- [2] Scalable Static Detection of Use-After-Free Vulnerabilities in Binary Code [J]. IEEE ACCESS, 2020, 8 : 78713 - 78725
- [3] POSTER: UAFChecker: Scalable Static Detection of Use-After-Free Vulnerabilities [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1529 - 1531
- [4] Dynamic Detection of Use-After-Free Bugs [J]. Programming and Computer Software, 2019, 45 : 365 - 371
- [5] Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection [J]. 33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 42 - 54
- [6] Dynamic Detection of Use-After-Free Bugs [J]. PROGRAMMING AND COMPUTER SOFTWARE, 2019, 45 (07) : 365 - 371
- [7] DangSan: Scalable Use-after-free Detection [J]. PROCEEDINGS OF THE TWELFTH EUROPEAN CONFERENCE ON COMPUTER SYSTEMS (EUROSYS 2017), 2017, : 405 - 419
- [8] UFO: Predictive Concurrency Use-After-Free Detection [J]. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 609 - 619
- [9] Spatio-Temporal Context Reduction: A Pointer-Analysis-Based Static Approach for Detecting Use-After-Free Vulnerabilities [J]. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 327 - 337
- [10] RTT: Reuse Time Tracking for Use-After-Free Detection [J]. PROCEEDINGS OF THE 38TH ACM INTERNATIONAL CONFERENCE ON SUPERCOMPUTING, ACM ICS 2024, 2024, : 376 - 387