Login / Signup
Detecting concurrency memory corruption vulnerabilities.
Yan Cai
Biyun Zhu
Ruijie Meng
Hao Yun
Liang He
Purui Su
Bin Liang
Published in:
ESEC/SIGSOFT FSE (2019)
Keyphrases
</>
data corruption
memory usage
main memory
automatic detection
computing power
data sets
memory size
concurrency control
information security
management system
countermeasures
transaction processing
security issues
data structure
neural network
databases
real time
buffer overflow