共 50 条
- [31] Typestate-Guided Fuzzer for Discovering Use-after-Free Vulnerabilities [J]. 2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020), 2020, : 999 - 1010
- [32] HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities [J]. 36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 454 - 465
- [33] Identifying Use-After-Free Variables in Fire-and-Forget Tasks [J]. 2017 IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2017, : 1086 - 1094
- [34] MineSweeper: A "Clean Sweep" for Drop-In Use-after-Free Prevention [J]. ASPLOS '22: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS, 2022, : 212 - 225
- [35] From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 414 - 425
- [37] Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 569 - 576
- [38] FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities [J]. PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 781 - 797
- [39] MarkUs: Drop-in use-after-free prevention for low-level languages [J]. 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 578 - 591
- [40] Mpchecker: Use-After-Free Vulnerabilities Protection Based on Multi-Level Pointers [J]. IEEE ACCESS, 2019, 7 : 45961 - 45977