{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T07:08:42Z","timestamp":1725692922288},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/spw54247.2022.9833896","type":"proceedings-article","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:14:47Z","timestamp":1658780087000},"page":"289-300","source":"Crossref","is-referenced-by-count":1,"title":["Hack the Heap: Heap Layout Manipulation made Easy"],"prefix":"10.1109","author":[{"given":"Jordy","family":"Gennissen","sequence":"first","affiliation":[{"name":"University of London,S3Lab, Information Security Group Royal Holloway"}]},{"given":"Daniel","family":"O'Keeffe","sequence":"additional","affiliation":[{"name":"University of London,S3Lab, Information Security Group Royal Holloway"}]}],"member":"263","reference":[{"article-title":"american fuzzy lop","year":"0","author":"zalewski","key":"ref33"},{"year":"2019","key":"ref32","article-title":"CVE-2019-13617"},{"year":"2019","key":"ref31","article-title":"CVE-2019-12206"},{"year":"2019","key":"ref30","article-title":"CVE-2019-11839"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354224"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866371"},{"key":"ref12","article-title":"Heaphopper: Bringing bounded model checking to heap implementation security","author":"eckert","year":"2018","journal-title":"Usenix Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00057"},{"key":"ref14","article-title":"{MAZE}: Towards automated heap feng shui","author":"wang","year":"2021","journal-title":"Usenix Security"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985733"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124782"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/nature09304"},{"key":"ref18","article-title":"Heap feng shui in javascript","author":"sotirov","year":"2007","journal-title":"Black Hat Europe'06"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00024"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207687"},{"key":"ref4","article-title":"Aeg: Automatic exploit generation","author":"avgerinos","year":"2011","journal-title":"NDSS"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1822348.1822354"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.17"},{"key":"ref6","article-title":"Automatic generation of data-oriented exploits","author":"hu","year":"2015","journal-title":"Usenix Security"},{"key":"ref29","article-title":"Efficient approach to fuzzing interpreters","author":"dominiak","year":"2019","journal-title":"BlackHat Asia"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.31"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243739"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3139337.3139346"},{"key":"ref1","article-title":"Automatic heap layout manipulation for exploitation","author":"heelan","year":"2018","journal-title":"Usenix Security"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363212"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1111\/j.1365-2966.2008.13490.x","article-title":"Galaxy zoo: the large-scale spin statistics of spiral galaxies in the sloan digital sky survey","author":"land","year":"2008","journal-title":"Monthly Notices of the Royal Astronomical Society"},{"key":"ref21","article-title":"Rise of the hacrs: Augmenting autonomous cyber reasoning systems with human assistance","author":"shoshitaishvili","year":"2017","journal-title":"ACM SIGSAC Conference on Computer and Communications Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1038\/nsmb.2119"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1093\/mnras\/staa138","article-title":"Planet Hunters TESS I: TOI 813, a subgiant hosting a transiting Saturn-sized planet on an 84-day orbit","author":"eisner","year":"2020","journal-title":"Monthly Notices of the Royal Astronomical Society"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1115898108"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1107\/S0907444911035943"}],"event":{"name":"2022 IEEE Security and Privacy Workshops (SPW)","start":{"date-parts":[[2022,5,22]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Security and Privacy Workshops (SPW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833855\/9833856\/09833896.pdf?arnumber=9833896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T20:02:37Z","timestamp":1660593757000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833896\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/spw54247.2022.9833896","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}