Automatic heap layout manipulation for exploitation

Sean Heelan, Tom Melham, Daniel Kroening
[ISBN] [Google Scholar] [DBLP] [Citeseer] [url]

27th USENIX Security Symposium (USENIX Security 18)
USENIX Association
Baltimore, MD
Pages 763-779
August 2018
Note(s): Automatic Exploit Generation
Papers: heelan:msc:2009, avgerinos:cacm:2014

Automatic exploit generation