共 50 条
- [41] Mitigating Use-After-Free Attack using Library Considering Size and Number of Freed Memory [J]. 2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 398 - 404
- [42] CRCount: Pointer Invalidation with Reference Counting to Mitigate Use-after-free in Legacy C/C plus [J]. 26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
- [45] Spatio-Temporal Context Reduction: A Pointer-Analysis-Based Static Approach for Detecting Use-After-Free Vulnerabilities [J]. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 327 - 337
- [46] Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs [J]. PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 2059 - 2074
- [47] xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 [J]. 2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022), 2022, : 502 - 519
- [48] Scalable and model-free detection of spatial patterns and colocalization [J]. GENOME RESEARCH, 2022, 32 (09) : 1736 - 1745
- [49] Easy-to-use scalable antennas for coherent detection of THz radiation [J]. NARROW GAP SEMICONDUCTORS 2007, 2008, 119 : 167 - 169
- [50] Automatic Detection of Multilevel Communities: Scalable, Selective and Resolution-Limit-Free [J]. APPLIED SCIENCES-BASEL, 2023, 13 (03):