xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64.
Lukas BernhardMichael RodlerThorsten HolzLucas DaviPublished in: CoRR (2022)
Keyphrases
- software development
- software systems
- metadata
- data structure
- user interface
- data mining
- computer systems
- security vulnerabilities
- software architecture
- security risks
- software tools
- software maintenance
- hardware design
- image tagging
- software platform
- collaborative tagging
- requirements engineering
- countermeasures
- embedded systems
- information security
- cloud computing
- data processing