共 15 条
- [2] Detecting Concurrency Memory Corruption Vulnerabilities ESEC/FSE'2019: PROCEEDINGS OF THE 2019 27TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2019, : 706 - 717
- [3] MemSherlock: An Automated Debugger for Unknown Memory Corruption Vulnerabilities CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 562 - +
- [4] Memory Corruption Vulnerabilities Detection for Android Binary Software 2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2015, : 16 - 20
- [5] Research on Discovering Memory Corruption Vulnerabilities for Embedded CGIs Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2020, 49 (05): : 745 - 750
- [7] SEnFuzzer: Detecting SGX Memory Corruption via Information Feedback and Tailored Interface Analysis PROCEEDINGS OF THE 26TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2023, 2023, : 485 - 498
- [8] Towards Heap-Based Memory Corruption Discovery 2021 17TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2021), 2021, : 502 - 511
- [9] Applications of Computational Intelligence for Static Software Checking Against Memory Corruption Vulnerabilities 2013 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN CYBER SECURITY (CICS), 2013, : 59 - 66
- [10] A Comprehensive Detection of Memory Corruption Vulnerabilities for C/C plus plus Programs 2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS, 2018, : 354 - 360