期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
A Survey of Detection Methods for Software Use-After-Free Vulnerability
1
作者 Faming Lu Mengfan Tang +1 位作者 Yunxia Bao Xiaoyu Wang 《国际计算机前沿大会会议论文集》 2022年第2期272-297,共26页
Due to the absence of validity detection on pointers and automatic memory rubbish reclaim mechanisms in programming languages such as the C/C++language,software developed in these languages may have many memory safety... Due to the absence of validity detection on pointers and automatic memory rubbish reclaim mechanisms in programming languages such as the C/C++language,software developed in these languages may have many memory safety vulnerabilities,such as Use-After-Free(UAF)vulnerability.An UAF vulnerability occurs when a memory object has been freed,but it can still be accessed through a dangling pointer that points to the object before it is reclaimed.Since UAF vulnerabilities are frequently exploited by malware which may lead to memory data leakage or corruption,much research work has been carried out to detect UAF vulnerabilities.This paper investigates existing UAF detection methods.After comparing and categorizing these methods,an outlook on the future development of UAF detection methods is provided.This has an important reference value for subsequent research on UAF detection. 展开更多
关键词 Memory safety Use-after-free vulnerability dangling pointer Software concurrency defect
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部