From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel.
Wen XuJuanru LiJunliang ShuWenbo YangTianyi XieYuanyuan ZhangDawu GuPublished in: CCS (2015)
Keyphrases
- linux kernel
- operating system
- software systems
- source code
- clone detection
- analysis tool
- software evolution
- open source
- collision avoidance
- information security
- collision detection
- security issues
- file system
- security vulnerabilities
- security mechanisms
- high level
- real world
- countermeasures
- database
- building blocks
- computer systems
- software engineering
- security risks
- artificial intelligence