共 50 条
- [1] Mitigating Use-After-Free Attack using Library Considering Size and Number of Freed Memory 2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 398 - 404
- [2] Mitigating Use-After-Free Attacks Using Memory-Reuse-Prohibited Library IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (10): : 2295 - 2306
- [3] Dynamic Detection of Use-After-Free Bugs Programming and Computer Software, 2019, 45 : 365 - 371
- [4] Detect use-after-free vulnerabilities in binaries Qinghua Daxue Xuebao/Journal of Tsinghua University, 2017, 57 (10): : 1022 - 1029
- [6] DangSan: Scalable Use-after-free Detection PROCEEDINGS OF THE TWELFTH EUROPEAN CONFERENCE ON COMPUTER SYSTEMS (EUROSYS 2017), 2017, : 405 - 419
- [8] UFO: Predictive Concurrency Use-After-Free Detection PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 609 - 619
- [9] Preventing Use-after-free with Dangling Pointers Nullification 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
- [10] Uncovering Use-After-Free Conditions In Compiled Code PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 90 - 99