UAF vulnerability exploitation judgement method and device

The invention provides a UAF vulnerability exploitation judgement method and device. The method comprises the following steps of: analyzing a memory distribution manner of a mobile terminal operationsystem, a function of a UAF vulnerability in the system, parameters of the function and a using scene...

Full description

Saved in:
Bibliographic Details
Main Authors QIU FENG, ZHU DALI, FENG WEIMIAO, LI YING, MA LUPING
Format Patent
LanguageChinese
English
Published 09.01.2018
Subjects
Online AccessGet full text

Cover

Loading…