We don’t have enough information about this author to calculate their statistics.
If you think this is an error
let us know.
Full text PDF available (1)
Highly Influential Citations
SUDUTA: Script UAF Detection Using Taint Analysis
Automatically Detecting and Diagnosing Use-‐after-‐free Vulnerabilities Present in Binary Files
Use-‐after-‐free (UAF) vulnerabilities are caused by the use of dangling pointers, which are pointers left referring to deallocated memory . Since their exploitation may allow BLOCKIN BLOCKIN attackers BLOCKIN