Submitted:
04 February 2026
Posted:
05 February 2026
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Materials and Methods
2.1. Sample and Study Context
2.2. Experimental Design and Control Conditions
2.3. Measurement Methods and Quality Assurance
2.4. Data Processing and Model Formulation
2.5. Implementation and Validation Setup
3. Results and Discussion
3.1. Reduction of UAF Exposure and Exploitability
3.2. Behavior Across Allocators and Workload Types
3.3. Comparison with Existing Isolation and PKS-Based Techniques
3.4. Limitations, Reliability Considerations, and Deployment Notes
4. Conclusion
References
- Watson, R. N.; Baldwin, J.; Chen, T.; Chisnall, D.; Clarke, J.; Davis, B.; Witaszczyk, K. No. UCAM-CL-TR-996; It is time to standardize principles and practices for software memory safety (extended version). University of Cambridge, Computer Laboratory, 2025.
- Hu, W. Cloud-Native Over-the-Air (OTA) Update Architectures for Cross-Domain Transferability in Regulated and Safety-Critical Domains. 2025 6th International Conference on Information Science, Parallel and Distributed Systems, 2025, September. [Google Scholar]
- Houy, S.; Kreyssig, B.; Riom, T.; Bartel, A.; McDaniel, P. A Practical Guideline and Taxonomy to LLVM's Control Flow Integrity. arXiv 2025, arXiv:2508.15386. [Google Scholar] [CrossRef]
- Liu, S.; Feng, H.; Liu, X. A Study on the Mechanism of Generative Design Tools' Impact on Visual Language Reconstruction: An Interactive Analysis of Semantic Mapping and User Cognition; Authorea Preprints, 2025. [Google Scholar]
- Diguna, L. J.; Lim, A.; Firdaus, Y.; Widiapradja, L. J.; Sidiq, D. H. S.; Melnychenko, A.; Birowosuto, M. D. The role of perovskite composition, dimensionality, and additives in lead-free perovskite solar cells longevity: a review. Sustainable Energy & Fuels 2025. [Google Scholar]
- Bai, W.; Xuan, K.; Huang, P.; Wu, Q.; Wen, J.; Wu, J.; Lu, K. Apilot: Navigating large language models to generate secure code by sidestepping outdated api pitfalls. arXiv 2024, arXiv:2409.16526. [Google Scholar] [CrossRef]
- Momeu, M.; Schnückel, S.; Angnis, K.; Polychronakis, M.; Kemerlis, V. P. Safeslab: Mitigating use-after-free vulnerabilities via memory protection keys. In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024, December; pp. 1345–1359. [Google Scholar]
- Du, Y. Research on Digital Quality Traceability System for Temperature-Controlled Supply Chain of Foreign Trade Wine Driven by Blockchain and IoT. Business and Social Sciences Proceedings 2025, 4, 57–65. [Google Scholar]
- Saileshwar, G.; Boivie, R.; Chen, T.; Segal, B.; Buyuktosunoglu, A. Heapcheck: Low-cost hardware support for memory safety. ACM Transactions on Architecture and Code Optimization (TACO) 2022, 19, 1–24. [Google Scholar] [CrossRef]
- Mao, Y.; Chang, K. M.; Chen, Z. Research on Frontend-Backend Collaboration and Performance Optimization for High-Concurrency Web Systems. 2026. [Google Scholar]
- Lim, S. Y.; Agrawal, S.; Han, X.; Eyers, D.; O'Keeffe, D.; Pasquier, T. Securing Monolithic Kernels using Compartmentalization. arXiv 2024, arXiv:2404.08716. [Google Scholar] [CrossRef]
- Mao, Y.; Chen, Z.; Ma, X. Research on a Lightweight Full-Stack Edge Execution Optimization Framework Based on Serverless and WebAssembly. 2026. [Google Scholar] [CrossRef]
- Kuzuno, H.; Yamauchi, T. Protection mechanism of kernel data using memory protection key. IEICE TRANSACTIONS on Information and Systems 2023, 106, 1326–1338. [Google Scholar] [CrossRef]
- Maar, L.; Schwarzl, M.; Rauscher, F.; Gruss, D.; Mangard, S. Dope: Domain protection enforcement with pks. In Proceedings of the 39th Annual Computer Security Applications Conference, 2023, December; pp. 662–676. [Google Scholar]
- Yang, M.; Wang, Y.; Shi, J.; Tong, L. Reinforcement Learning Based Multi-Stage Ad Sorting and Personalized Recommendation System Design. 2025. [Google Scholar] [PubMed]
- Salek Maghsoudi, S.; Åkvist, M. Exploring Heuristics for Predicting Microbenchmark Stability and Code Coverage using Static Code Analysis. 2024. [Google Scholar]
- López García, J.J.; Pereira, D.P. Analyzing system security architecture in concept phase using UAF domains. INSIGHT 2022, 25, 56–60. [Google Scholar] [CrossRef]
- Peng, H.; Jin, X.; Huang, Q.; Liu, S. E-commerce Intelligent Recommendation Optimization and Personalized Marketing Strategy Based on Big Model. 2025. [Google Scholar] [CrossRef]
- Lee, S.H.; Yang, M.; Klopfer, E.; Coughlin, J. Boundary objects in longevity planning service: exploring personas and dualities through constructivist grounded theory. Design Science 2025, 11, e17. [Google Scholar] [CrossRef]
- Serebrennikov, D.; Kalkanbay, S. What’s sauce for the goose is sauce for the gander? Near-repeat victimization across different urban morphologies: Evidence from Almaty, Kazakhstan. Journal of Criminal Justice 2026, 102, 102551. [Google Scholar] [CrossRef]
- Du, Y. Research on Deep Learning Models for Forecasting Cross-Border Trade Demand Driven by Multi-Source Time-Series Data. Journal of Science, Innovation & Social Impact 2025, 1, 63–70. [Google Scholar]
- Konev, A.; Shelupanov, A.; Kataev, M.; Ageeva, V.; Nabieva, A. A survey on threat-modeling techniques: protected objects and classification of threats. Symmetry 2022, 14, 549. [Google Scholar] [CrossRef]
- Jarkas, O.; Ko, R.; Dong, N.; Mahmud, R. A Container Security Survey: Exploits, Attacks, and Defenses. ACM Computing Surveys 2025, 57, 1–36. [Google Scholar] [CrossRef]
- Lozano, S.; Lugo, T.; Carretero, J. A comprehensive survey on the use of hypervisors in safety-critical systems. IEEE Access 2023, 11, 36244–36263. [Google Scholar] [CrossRef]


Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).