A Study on the Remove Use-After-Free Security Weakness


KIPS Transactions on Computer and Communication Systems, Vol. 6, No. 1, pp. 43-50, Jan. 2017
10.3745/KTCCS.2017.6.1.43, Full Text:
Keywords: Security Weakness, Vulnerability, Dangling Pointer, Nullification
Abstract

Use-After-Free security problem is rapidly growing in popularity, especially for attacking web browser, operating system kernel, local software. This security weakness is difficult to detect by conventional methods. And if local system or software has this security weakness, it cause internal security problem. In this paper, we study ways to remove this security weakness in software development by summarize the cause of the Use-After-Free security weakness and suggest ways to remove them.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
Y. K. Park and J. Y. Choi, "A Study on the Remove Use-After-Free Security Weakness," KIPS Transactions on Computer and Communication Systems, vol. 6, no. 1, pp. 43-50, 2017. DOI: 10.3745/KTCCS.2017.6.1.43.

[ACM Style]
Yong Koo Park and Jin Young Choi. 2017. A Study on the Remove Use-After-Free Security Weakness. KIPS Transactions on Computer and Communication Systems, 6, 1, (2017), 43-50. DOI: 10.3745/KTCCS.2017.6.1.43.