Locating vulnerabilities in binaries via memory layout recovering.
Haijun WangXiaofei XieShang-Wei LinYun LinYuekang LiShengchao QinYang LiuTing LiuPublished in: ESEC/SIGSOFT FSE (2019)
Keyphrases
- source code
- low memory
- memory requirements
- security vulnerabilities
- main memory
- information security
- control flow
- data corruption
- reverse engineering
- memory usage
- data flow
- buffer overflow
- layout design
- security risks
- memory size
- dos attacks
- random access
- computing power
- learning algorithm
- open source software
- lightweight
- database management systems
- open source
- web services
- information systems
- artificial intelligence