共 46 条
- [1] Dynamic Detection of Use-After-Free Bugs [J]. Programming and Computer Software, 2019, 45 : 365 - 371
- [2] Detect use-after-free vulnerabilities in binaries [J]. Qinghua Daxue Xuebao/Journal of Tsinghua University, 2017, 57 (10): : 1022 - 1029
- [3] Dynamic Detection of Use-After-Free Bugs [J]. PROGRAMMING AND COMPUTER SOFTWARE, 2019, 45 (07) : 365 - 371
- [4] DangSan: Scalable Use-after-free Detection [J]. PROCEEDINGS OF THE TWELFTH EUROPEAN CONFERENCE ON COMPUTER SYSTEMS (EUROSYS 2017), 2017, : 405 - 419
- [5] Preventing Use-after-free with Dangling Pointers Nullification [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
- [6] Uncovering Use-After-Free Conditions In Compiled Code [J]. PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 90 - 99
- [7] UFO: Predictive Concurrency Use-After-Free Detection [J]. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 609 - 619
- [8] Preventing Use-After-Free Attacks with Fast Forward Allocation [J]. PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 2453 - 2470
- [9] Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services [J]. PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 297 - 311
- [10] Use-After-Free Mitigation via Protected Heap Allocation [J]. 2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 131 - 138