Login / Signup

Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software.

Hong HuZheng Leong ChuaZhenkai LiangPrateek Saxena
Published in: ESORICS (2) (2015)
Keyphrases
  • memory access
  • software development
  • computer systems
  • data access
  • software systems
  • software developers
  • data management
  • embedded systems
  • data storage