Sign in

UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management.

Guangquan XuWenqing LeiLixiao GongJian LiuHongpeng BaiKai ChenRan WangWei WangKaitai LiangWeizhe WangWeizhi MengShaoying Liu
Published in: Comput. Secur. (2023)
Keyphrases