Sign in

From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel.

Wen XuJuanru LiJunliang ShuWenbo YangTianyi XieYuanyuan ZhangDawu Gu
Published in: CCS (2015)
Keyphrases