您当前的位置:
首页 >
文章列表页 >
Automatic exploitation generation method of write-what-where vulnerability
Papers | 更新时间:2024-06-05
    • Automatic exploitation generation method of write-what-where vulnerability

    • Journal on Communications   Vol. 43, Issue 1, Pages: 83-95(2022)
    • DOI:10.11959/j.issn.1000-436x.2022003    

      CLC: TP311
    • Online First:2022-01

      Published:25 January 2022

    移动端阅览

  • Huafeng HUANG, Purui SU, Yi YANG, et al. Automatic exploitation generation method of write-what-where vulnerability[J]. Journal on Communications, 2022, 43(1): 83-95. DOI: 10.11959/j.issn.1000-436x.2022003.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1679

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Protocol format extraction at semantic level
Attack signature generation by traceable dynamic taint analysis

Related Author

Zheng HONG
Zhen-ji ZHOU
Li-fa WU
Fan PAN
Yu LIU
Mei-ning NIE
Pu-rui SU
Deng-guo FENG

Related Institution

College of Command Information System,PLA University of Science and Technology
State Key Laboratory of Information Security,Institution of Software,Chinese Academy of Sciences
0