Author:
Caballero Juan,Grieco Gustavo,Marron Mark,Nappa Antonio
Cited by
69 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. DSLR–: A low-overhead data structure layout randomization for defending data-oriented programming;Journal of Computer Security;2023-11-24
2. Targeted Symbolic Execution for UAF Vulnerabilities;2023 7th International Conference on System Reliability and Safety (ICSRS);2023-11-22
3. All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability;Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses;2023-10-16
4. A survey of automatic exploitation of binary vulnerabilities;International Conference on Computer Network Security and Software Engineering (CNSSE 2023);2023-06-26
5. WAFFLE: Exposing Memory Ordering Bugs Efficiently with Active Delay Injection;Proceedings of the Eighteenth European Conference on Computer Systems;2023-05-08