2014
DOI: 10.1007/s11416-014-0203-1
|View full text |Cite
|
Sign up to set email alerts
|

Statically detecting use after free on binary code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
42
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 58 publications
(42 citation statements)
references
References 9 publications
0
42
0
Order By: Relevance
“…References [9] and [10] add codes that detect dangling pointers in a compilation and detect UAF attacks in runtime. References [9] and [11] detect dangling pointers by a static analysis of a binary program. Reference [12] inserts dynamic runtime checks for protecting against UAF vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…References [9] and [10] add codes that detect dangling pointers in a compilation and detect UAF attacks in runtime. References [9] and [11] detect dangling pointers by a static analysis of a binary program. Reference [12] inserts dynamic runtime checks for protecting against UAF vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…Another problem is that the search for vulnerability at the source program level may have high false positive rate [9]. They establish the vulnerability knowledge database and find the similar functions to the test ones to determine the vulnerability types.…”
Section: Introductionmentioning
confidence: 99%
“…Intraprocedural analysis limit to the scope of the current function, however, interprocedural analysis has the ability to enter sub-functions [9]. Needless to say, in-process analysis is much simpler than the process.…”
Section: Introductionmentioning
confidence: 99%