Shen, Q., Meng, G., & Chen, K. (2024, July). Revealing the exploitability of heap overflow through PoC analysis. Cybersecurity.
Chicago Style (17th ed.) CitationShen, Qintao, Guozhu Meng, and Kai Chen. "Revealing the Exploitability of Heap Overflow Through PoC Analysis." Cybersecurity Jul. 2024.
MLA (9th ed.) CitationShen, Qintao, et al. "Revealing the Exploitability of Heap Overflow Through PoC Analysis." Cybersecurity, Jul. 2024.
Warning: These citations may not always be 100% accurate.
