共 48 条
- [1] Preventing Use-after-free with Dangling Pointers Nullification [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
- [2] HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities [J]. 36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 454 - 465
- [3] Refining Use-after-free Defense: Eliminating Dangling Pointers in Registers and Memory [J]. PROCEEDINGS OF THE 2023 30TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, APSEC 2023, 2023, : 493 - 502
- [4] Mpchecker: Use-After-Free Vulnerabilities Protection Based on Multi-Level Pointers [J]. IEEE ACCESS, 2019, 7 : 45961 - 45977
- [5] Detect use-after-free vulnerabilities in binaries [J]. Qinghua Daxue Xuebao/Journal of Tsinghua University, 2017, 57 (10): : 1022 - 1029
- [6] Typestate-Guided Fuzzer for Discovering Use-after-Free Vulnerabilities [J]. 2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020), 2020, : 999 - 1010
- [7] Scalable Static Detection of Use-After-Free Vulnerabilities in Binary Code [J]. IEEE ACCESS, 2020, 8 : 78713 - 78725
- [8] POSTER: UAFChecker: Scalable Static Detection of Use-After-Free Vulnerabilities [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1529 - 1531
- [9] From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 414 - 425
- [10] Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 569 - 576