Abstract: Use-After-Free (UAF) vulnerability is one of the common vulnerabilities in multi-threaded programs. Its static detection methods based on value flow analysis commonly show good analysis ...
Abstract: With the increasing sophistication of malware, enhanced Attributed Control Flow Graphs (ACFGs) have become a fundamental representation and are widely applied in malware detection. However, ...