The following publications are possibly variants of this publication:
- Towards Automated Detection of Higher-Order Memory Corruption Vulnerabilities in Embedded DevicesLei Yu, Linyu Li, Haoyu Wang, Xiaoyu Wang, Houhua He, Xiaorui Gong. date 2021: 1707-1710 [doi]
- Memsherlock: an automated debugger for unknown memory corruption vulnerabilitiesEmre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu. ccs 2007: 562-572 [doi]
- Automatic diagnosis and response to memory corruption vulnerabilitiesJun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt. ccs 2005: 223-234 [doi]
- Locating vulnerabilities in binaries via memory layout recoveringHaijun Wang, Xiaofei Xie, Shang-Wei Lin, Yun Lin 0001, Yuekang Li, Shengchao Qin, Yang Liu, Ting Liu. FSE 2019: 718-728 [doi]
- Towards Heap-Based Memory Corruption DiscoveryWenzhi Wang, Meng Fan, Aimin Yu, Dan Meng. msn 2021: 502-511 [doi]