A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is
to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. ... Acknowledgments We would like to thank our shepherd, Brendan Dolan-Gavitt, for his help and comments. ... Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon. The views and ...dblp:conf/uss/EckertB0SKV18 fatcat:ok74aezv6fgr5h56g72aziwcre
Lecture Notes in Computer Science
Current studies require a sensitive pointer on the heap to hijack the control flow and pay little attention to vulnerabilities with limited capabilities. ... All the exploits could bypass NX  and Full RELRO  security mechanisms. ... Heaphopper  is an automated approach to analyze the exploitability of heap implementations in the presence of memory corruption. ...doi:10.1007/978-3-030-52683-2_5 fatcat:qz4u3hb63negtlsbjzvuecwiye
of heap metadata. ... In this paper, we aim to explore whether heap metadata could be corrupted and exploited by cyberattackers, in an attempt to assess the exploitability of vulnerabilities and ensure software quality. ... MOP construction and MOG extraction are implemented on top of IDA Python  . Also, we implemented a heap allocator model by building function mapping relationships in Python. ...doi:10.1155/2020/8883746 fatcat:vb74hepyenhifcx5okipfozaba