UAF vulnerability exploitation judgement method and device
The invention provides a UAF vulnerability exploitation judgement method and device. The method comprises the following steps of: analyzing a memory distribution manner of a mobile terminal operationsystem, a function of a UAF vulnerability in the system, parameters of the function and a using scene...
Saved in:
Main Authors | , , , , |
---|---|
Format | Patent |
Language | Chinese English |
Published |
09.01.2018
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!