共 50 条
- [1] Mitigating Use-After-Free Attack using Library Considering Size and Number of Freed Memory [J]. 2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 398 - 404
- [2] RTT: Reuse Time Tracking for Use-After-Free Detection [J]. PROCEEDINGS OF THE 38TH ACM INTERNATIONAL CONFERENCE ON SUPERCOMPUTING, ACM ICS 2024, 2024, : 376 - 387
- [3] Mitigating Use-After-Free Attack with Application Program Loader [J]. 2017 IEEE 31ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2017, : 919 - 924
- [4] Preventing Use-After-Free Attacks with Fast Forward Allocation [J]. PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 2453 - 2470
- [5] HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks [J]. NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 219 - 234
- [6] Refining Use-after-free Defense: Eliminating Dangling Pointers in Registers and Memory [J]. PROCEEDINGS OF THE 2023 30TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, APSEC 2023, 2023, : 493 - 502
- [7] Dynamic Detection of Use-After-Free Bugs [J]. Programming and Computer Software, 2019, 45 : 365 - 371
- [8] PUMM: Preventing Use-After-Free Using Execution Unit Partitioning [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 823 - 840
- [9] Detect use-after-free vulnerabilities in binaries [J]. Qinghua Daxue Xuebao/Journal of Tsinghua University, 2017, 57 (10): : 1022 - 1029
- [10] Dynamic Detection of Use-After-Free Bugs [J]. PROGRAMMING AND COMPUTER SOFTWARE, 2019, 45 (07) : 365 - 371