References
- L. Szekeres, M. Payer, T. Wei, and D. Song, "Sok: Eternal war in memory," in Security and Privacy (SP), 2013 IEEE Symposium on, pp.48-62, 2013.
- Breno Cunha, Perspectives on exploit development and cyber attacks [Internet], http://blog.tempest.com.br/breno-cunha/perspectives-on-exploit-development-and-cyber-attacks.html.
- J. Caballero, G. Grieco, M. Marron, and A. Nappa, "Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities," in Proceedings of the 2012 International Symposium on Software Testing and Analysis, pp.133-143, 2012.
- B. Zhang, B. Wu, C. Feng, X. Zhang, and C. Tang, "Statically detect invalid pointer dereference vulnerabilities in binary soft ware," in 2015 IEEE International Conference on Progress in Informatics and Computing (PIC), pp.390-394, 2015.
- Mark Yason, Use-After-Frees : That pointer may be pointing to something bad[Internet] https://securityintelligence.com/us e-after-frees-that-pointer-may-be-pointing-to-somethingbad.
- J. Feist, L. Mounier, and M. L. Potet, "Statically detecting use after free on binary code," Journal of Computer Virology and Hacking Techniques, Vol.10, No.3, pp.211-217, 2014. https://doi.org/10.1007/s11416-014-0203-1
- B. Lee, C. Song, Y. Jang, T. Wang, T. Kim, L. Lu, and W. Lee, "Preventing Use-after-free with Dangling Pointers Nullification," in NDSS, 2015.
- W. Xu, J. Li, J. Shu, W. Yang, T. Xie, Y. Zhang, and D. Gu, "From collision to exploitation: Unleashing use-after-free vulnerabilities in linux kernel," in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.414-425, 2015.
- G. Tassey, "The economic impacts of inadequate infrastructure for software testing," National Institute of Standards and Technology, RTI Project, 7007(011). 2002.
- CVE-2012-4792 [Internet], http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4792.
- Red Alert, CVE-2012-4792 Microsoft Internet Explorer CButton Object Use-After-Free Vulnerability, 2013.
- H.M. Kim, "Windows System Hacking Guide : Bug Hunting and Exploit," SECU BOOK, Goyang-City, Gyunggi Province, 2016.
- CERT : MEM01-C [Internet], https://www.securecoding.cert.org/confluence/pages/viewpage.action?pageId=440.
- CWE-416 : Use After Free [Internet], https://cwe.mitre.org/data/definitions/416.html.