Login / Signup
Automatic Heap Layout Manipulation for Exploitation.
Sean Heelan
Tom Melham
Daniel Kroening
Published in:
USENIX Security Symposium (2018)
Keyphrases
</>
data structure
semi automatic
case study
cooperative
real time
social networks
information systems