VTPin

Author:

Sarbinowski Pawel1,Kemerlis Vasileios P.2,Giuffrida Cristiano1,Athanasopoulos Elias1

Affiliation:

1. Vrije Universiteit Amsterdam

2. Brown University

Publisher

ACM

Reference61 articles.

1. Advanced Exploitation of Mozilla Firefox Use-after-free Vulnerability (MFSA 2012-22). http://www.vupen.com/blog/20120625.Advanced_Exploitation_of_Mozilla_Firefox_UaF_CVE-2012-0469.php. Advanced Exploitation of Mozilla Firefox Use-after-free Vulnerability (MFSA 2012-22). http://www.vupen.com/blog/20120625.Advanced_Exploitation_of_Mozilla_Firefox_UaF_CVE-2012-0469.php.

2. Advanced Exploitation of Mozilla Firefox Use-After-Free Vulnerability (Pwn2Own 2014). http://www.vupen.com/blog/20140520.Advanced_Exploitation_Firefox_UaF_Pwn2Own_2014.php. Advanced Exploitation of Mozilla Firefox Use-After-Free Vulnerability (Pwn2Own 2014). http://www.vupen.com/blog/20140520.Advanced_Exploitation_Firefox_UaF_Pwn2Own_2014.php.

3. Hooking the memory allocator in Firefox. https://glandium.org/blog/?p=2848. Hooking the memory allocator in Firefox. https://glandium.org/blog/?p=2848.

4. Itanium C++ ABI. https://mentorembedded.github.io/cxx-abi/abi.html. Itanium C++ ABI. https://mentorembedded.github.io/cxx-abi/abi.html.

5. Pwn2Own 2015: The year every web browser went down. http://www.zdnet.com/article/pwn2own-2015-the-year-every-browser-went-down/. Pwn2Own 2015: The year every web browser went down. http://www.zdnet.com/article/pwn2own-2015-the-year-every-browser-went-down/.

Cited by 23 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. On the Analysis of Byte-Granularity Heap Randomization;IEEE Transactions on Dependable and Secure Computing;2021-09-01

2. Integrating and Validating Maritime Transport Security Services: Initial results from the CS4EU demonstrator;2021 Thirteenth International Conference on Contemporary Computing (IC3-2021);2021-08-05

3. UAFSan: an object-identifier-based dynamic approach for detecting use-after-free vulnerabilities;Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis;2021-07-11

4. Automated Use-After-Free Detection and Exploit Mitigation: How Far Have We Gone;IEEE Transactions on Software Engineering;2021

5. Finding Cracks in Shields: On the Security of Control Flow Integrity Mechanisms;Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security;2020-10-30

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3