Zobrazeno 1 - 3
of 3
pro vyhledávání: '"Junseung You"'
Publikováno v:
IEEE Access, Vol 12, Pp 5462-5476 (2024)
Preventing Use-After-Free (UAF) bugs is crucial to ensure temporal memory safety. Against UAF attacks, much research has adopted a well-known approach, lock-and-key, in which unique, disposable locks and keys are first assigned respectively to object
Externí odkaz:
https://doaj.org/article/da8da3be40344961baad91a9e86733e0
Publikováno v:
IEEE Access, Vol 8, Pp 225356-225369 (2020)
Much compelling evidence urges that the isolation provided by the hypervisor in a virtualized system is not complete at all, and in practice can be neutralized by elaborated adversaries, which consequently emphasizes the need of techniques to detect
Externí odkaz:
https://doaj.org/article/c03d341f1cf3482d93c7524558f599b5
Publikováno v:
IEEE Access, Vol 8, Pp 225356-225369 (2020)
Much compelling evidence urges that the isolation provided by the hypervisor in a virtualized system is not complete at all, and in practice can be neutralized by elaborated adversaries, which consequently emphasizes the need of techniques to detect