Login / Signup
Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software.
Hong Hu
Zheng Leong Chua
Zhenkai Liang
Prateek Saxena
Published in:
ESORICS (2) (2015)
Keyphrases
</>
memory access
software development
computer systems
data access
software systems
software developers
data management
embedded systems
data storage