A Survey of Detection Methods for Software Use-After-Free Vulnerability  

在线阅读下载全文

作  者:Faming Lu Mengfan Tang Yunxia Bao Xiaoyu Wang 

机构地区:[1]Shandong University of Science and Technology,Qingdao 266590,Shandong,China

出  处:《国际计算机前沿大会会议论文集》2022年第2期272-297,共26页International Conference of Pioneering Computer Scientists, Engineers and Educators(ICPCSEE)

摘  要:Due to the absence of validity detection on pointers and automatic memory rubbish reclaim mechanisms in programming languages such as the C/C++language,software developed in these languages may have many memory safety vulnerabilities,such as Use-After-Free(UAF)vulnerability.An UAF vulnerability occurs when a memory object has been freed,but it can still be accessed through a dangling pointer that points to the object before it is reclaimed.Since UAF vulnerabilities are frequently exploited by malware which may lead to memory data leakage or corruption,much research work has been carried out to detect UAF vulnerabilities.This paper investigates existing UAF detection methods.After comparing and categorizing these methods,an outlook on the future development of UAF detection methods is provided.This has an important reference value for subsequent research on UAF detection.

关 键 词:Memory safety Use-after-free vulnerability Dangling pointer Software concurrency defect 

分 类 号:TP3[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象