共 50 条
- [21] PUMM: Preventing Use-After-Free Using Execution Unit Partitioning [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 823 - 840
- [22] Typestate-Guided Fuzzer for Discovering Use-after-Free Vulnerabilities [J]. 2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020), 2020, : 999 - 1010
- [23] HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities [J]. 36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 454 - 465
- [24] Identifying Use-After-Free Variables in Fire-and-Forget Tasks [J]. 2017 IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2017, : 1086 - 1094
- [25] MineSweeper: A "Clean Sweep" for Drop-In Use-after-Free Prevention [J]. ASPLOS '22: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS, 2022, : 212 - 225
- [26] Refining Use-after-free Defense: Eliminating Dangling Pointers in Registers and Memory [J]. PROCEEDINGS OF THE 2023 30TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, APSEC 2023, 2023, : 493 - 502
- [27] FreeSentry: Protecting Against Use-After-Free Vulnerabilities Due to Dangling Pointers [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
- [28] From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 414 - 425
- [29] Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 569 - 576
- [30] FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities [J]. PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 781 - 797