Identifying and analyzing pointer misuses for sophisticated memory-corruption exploit diagnosis

Abstract

Software exploits are one of the major threats to internet security. To quickly respond to these attacks, it is critical to automatically diagnose such exploits and find out how they circumvent existing defense mechanisms

    Similar works