Automatic exploitation generation method of write-what-where vulnerability
To solve the problem that the current vulnerability automatic exploitation generation methods cannot automatically generate control-flow-hijacking exploitation from write-what-where, a method of automatic exploitation generation for write-what-where was proposed.First, the write-what-where vulnerabi...
| Published in: | Tongxin xuebao |
|---|---|
| Main Authors: | , , , |
| Format: | Article |
| Language: | Chinese |
| Published: |
Editorial Department of Journal on Communications
2022-01-01
|
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2022003 |
