Automatic Heap Layout Manipulation for Exploitation

Sean Heelan, Tom Melham, Daniel Kroening. Automatic Heap Layout Manipulation for Exploitation. In William Enck, Adrienne Porter Felt, editors, 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018. pages 763-779, USENIX Association, 2018. [doi]

@inproceedings{HeelanMK18,
  title = {Automatic Heap Layout Manipulation for Exploitation},
  author = {Sean Heelan and Tom Melham and Daniel Kroening},
  year = {2018},
  url = {https://www.usenix.org/conference/usenixsecurity18/presentation/heelan},
  researchr = {https://researchr.org/publication/HeelanMK18},
  cites = {0},
  citedby = {0},
  pages = {763-779},
  booktitle = {27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018},
  editor = {William Enck and Adrienne Porter Felt},
  publisher = {USENIX Association},
}