共 46 条
- [1] Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection [J]. 33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 42 - 54
- [2] Detect use-after-free vulnerabilities in binaries [J]. Qinghua Daxue Xuebao/Journal of Tsinghua University, 2017, 57 (10): : 1022 - 1029
- [3] Scalable Static Detection of Use-After-Free Vulnerabilities in Binary Code [J]. IEEE ACCESS, 2020, 8 : 78713 - 78725
- [4] HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities [J]. 36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 454 - 465
- [5] POSTER: UAFChecker: Scalable Static Detection of Use-After-Free Vulnerabilities [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1529 - 1531
- [6] From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 414 - 425
- [7] FreeSentry: Protecting Against Use-After-Free Vulnerabilities Due to Dangling Pointers [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
- [8] Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 569 - 576
- [9] FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities [J]. PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 781 - 797
- [10] Mpchecker: Use-After-Free Vulnerabilities Protection Based on Multi-Level Pointers [J]. IEEE ACCESS, 2019, 7 : 45961 - 45977