Mitigating Use-After-Free Attacks Using Memory-Reuse-Prohibited Library.
Toshihiro YamauchiYuta IkegamiYuya BanPublished in: IEICE Trans. Inf. Syst. (2017)
Keyphrases
- data corruption
- countermeasures
- memory usage
- main memory
- memory requirements
- learning objects
- memory space
- limited memory
- software reuse
- terrorist attacks
- malicious attacks
- computational power
- risk management
- security protocols
- watermarking technique
- security threats
- traffic analysis
- security risks
- virtual memory
- random access
- computing power
- malicious users