동적 기호 실행을 이용한 윈도우 시스템 콜 Use-After-Free 취약점 자동 탐지 방법
Vol. 27, No. 4, pp. 803-810,
8월.
2017
10.13089/JKIISC.2017.27.4.803, Full Text:
Keywords: Dynamic Symbolic Execution, Windows Kernel, Use-After-Free, software vulnerability
Abstract Statistics
Cite this article
10.13089/JKIISC.2017.27.4.803, Full Text:
Keywords: Dynamic Symbolic Execution, Windows Kernel, Use-After-Free, software vulnerability
Abstract Statistics
Cite this article
[IEEE Style]
S. Kang, G. Lee, B. Noh, "Automated Method for Detecting Use-After-Free Vulnerability of Windows System Calls Using Dynamic Symbolic Execution," Journal of The Korea Institute of Information Security and Cryptology, vol. 27, no. 4, pp. 803-810, 2017. DOI: 10.13089/JKIISC.2017.27.4.803.
[ACM Style]
Sangyong Kang, Gwonwang Lee, and Bongnam Noh. 2017. Automated Method for Detecting Use-After-Free Vulnerability of Windows System Calls Using Dynamic Symbolic Execution. Journal of The Korea Institute of Information Security and Cryptology, 27, 4, (2017), 803-810. DOI: 10.13089/JKIISC.2017.27.4.803.