Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

바이너리에서 Invalid Memory Access 취약점 탐지 기술 동향 연구

Full metadata record
DC Field Value Language
dc.contributor.author오희국-
dc.date.accessioned2025-04-01T06:01:23Z-
dc.date.available2025-04-01T06:01:23Z-
dc.date.issued2021-06-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/122421-
dc.description.abstractAccording to the vulnerability risk rankings calculated by the CWE website, most of the top vulnerabilities are invalid memory access vulnerabilities such as out-of-bounds write, use-after-free, null-pointer-dereference, etc. This is because the characteristic of the memory-related vulnerability, which lacks sanitization in a data flow, satisfied the requirements of the attackers to exploit. Most of the vulnerability detection research is based on source code. However, due to many manufacturers or vendors only providing products but not source code, techniques that can detect vulnerabilities in the binary is necessary in such situations. While due to the lack of many types as in high-level languages, such as pointers, vulnerability detection in binary systems poses many challenges. In this article, we discuss such challenges for invalid memory access vulnerability detection in binary-
dc.language영어-
dc.language.isoENG-
dc.title바이너리에서 Invalid Memory Access 취약점 탐지 기술 동향 연구-
dc.typeConference-
dc.citation.title한국정보보호학회 하계학술대회-
dc.citation.volume31-
dc.citation.number1-
dc.citation.startPage576-
dc.citation.endPage579-
Files in This Item
There are no files associated with this item.
Appears in
Collections
COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 2. Conference Papers

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Oh, Hee kuck photo

Oh, Hee kuck
ERICA 소프트웨어융합대학 (ERICA 컴퓨터학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE