ACM Computer and Communications Security, CCS 2015


Article Details
Title: From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel
Article URLs:
Alternative Article URLs:
Authors: Wen Xu
  • Shanghai Jiao Tong University 800 Dongchuan Road, Shanghai, China
Juanru Li
  • Shanghai Jiao Tong University 800 Dongchuan Road, Shanghai, China
Junliang Shu
  • Shanghai Jiao Tong University 800 Dongchuan Road, Shanghai, China
Wenbo Yang
  • Shanghai Jiao Tong University 800 Dongchuan Road, Shanghai, China
Tianyi Xie
  • Shanghai Jiao Tong University 800 Dongchuan Road, Shanghai, China
Yuanyuan Zhang
  • Shanghai Jiao Tong University 800 Dongchuan Road, Shanghai, China
Dawu Gu
  • Shanghai Jiao Tong University 800 Dongchuan Road, Shanghai, China
Sharing: Unknown
Verification: Authors have not verified information
Artifact Evaluation Badge: none
Artifact URLs:
Artifact Correspondence Email Addresses:
NSF Award Numbers:
DBLP Key: conf/ccs/XuLSYXZG15
Author Comments:

Discuss this paper and its artifacts below