The following publications are possibly variants of this publication:
- Learning Fine-Grained Structured Input for Memory Corruption DetectionLei Zhao, Debin Gao, Lina Wang. isw 2012: 151-167 [doi]
- Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit DiagnosisLei Zhao, Run Wang, Lina Wang, Yueqiang Cheng. compsac 2015: 434-443 [doi]
- deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary levelRun Wang, Pei Liu, Lei Zhao, Yueqiang Cheng, Lina Wang. jss, 124:153-168, 2017. [doi]
- Detecting concurrency memory corruption vulnerabilitiesYan Cai 0001, Biyun Zhu, Ruijie Meng, Hao Yun, Liang He, Purui Su, Bin Liang. FSE 2019: 706-717 [doi]