Search Results 1-1 of 1

  • Mitigating Use-After-Free Attacks Using Memory-Reuse-Prohibited Library

    YAMAUCHI Toshihiro , IKEGAMI Yuta , BAN Yuya

    … <p>Recently, there has been an increase in use-after-free (UAF) vulnerabilities, which are exploited using a dangling pointer that refers to a freed memory. … In particular, large-scale programs such as browsers often include many dangling pointers, and UAF vulnerabilities are frequently exploited by drive-by download attacks. … Various methods to prevent UAF attacks have been proposed. …

    IEICE Transactions on Information and Systems E100.D(10), 2295-2306, 2017

    J-STAGE 

Page Top