Jiayi Ye

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Use-after-free vulnerabilities are gaining more and more attentions in recent years, since they are commonly exploited in applications like browsers, and exposed in abundant security updates, e.g., from Microsoft, Google or Mozilla. This kind of vulnerabilities are triggered by dereferencing a dangling pointer, and may introduce high risks into the system(More)
  • 1