Mitigating Use-After-Free Attacks using Memory-Reuse-Prohibited Library

Toshihiro YAMAUCHI  Yuta IKEGAMI  Yuya BAN  

Publication:   IEICE TRANSACTIONS on Information and Systems
Publicized: 2017/07/21
DOI: 10.1587/transinf.2016INP0020
Full Text: PDF(344.9KB)