A Survey of Detection Methods for Software Use-After-Free Vulnerability.
Faming LuMengfan TangYunxia BaoXiaoyu WangPublished in: ICPCSEE (2) (2022)
Keyphrases
- computational cost
- software components
- artificial intelligence
- high dimensional data
- open source
- empirical studies
- false alarms
- database
- software tools
- automatic detection
- machine learning methods
- software systems
- benchmark datasets
- detection algorithm
- data mining techniques
- object detection
- significant improvement
- preprocessing
- multiscale
- feature selection
- information systems
- genetic algorithm
- machine learning
- real time