{"id":"https://openalex.org/W4287851274","doi":"https://doi.org/10.1109/spw54247.2022.9833896","title":"Hack the Heap: Heap Layout Manipulation made Easy","display_name":"Hack the Heap: Heap Layout Manipulation made Easy","publication_year":2022,"publication_date":"2022-05-01","ids":{"openalex":"https://openalex.org/W4287851274","doi":"https://doi.org/10.1109/spw54247.2022.9833896"},"language":"en","primary_location":{"id":"doi:10.1109/spw54247.2022.9833896","is_oa":false,"landing_page_url":"https://doi.org/10.1109/spw54247.2022.9833896","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Security and Privacy Workshops (SPW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012870323","display_name":"Jordy Gennissen","orcid":null},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Jordy Gennissen","raw_affiliation_strings":["University of London,S3Lab, Information Security Group Royal Holloway","S3Lab, Information Security Group Royal Holloway, University of London"],"affiliations":[{"raw_affiliation_string":"University of London,S3Lab, Information Security Group Royal Holloway","institution_ids":["https://openalex.org/I184558857"]},{"raw_affiliation_string":"S3Lab, Information Security Group Royal Holloway, University of London","institution_ids":["https://openalex.org/I184558857"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026745638","display_name":"Dan O\u2019Keeffe","orcid":"https://orcid.org/0000-0003-3751-477X"},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Daniel O'Keeffe","raw_affiliation_strings":["University of London,S3Lab, Information Security Group Royal Holloway","S3Lab, Information Security Group Royal Holloway, University of London"],"affiliations":[{"raw_affiliation_string":"University of London,S3Lab, Information Security Group Royal Holloway","institution_ids":["https://openalex.org/I184558857"]},{"raw_affiliation_string":"S3Lab, Information Security Group Royal Holloway, University of London","institution_ids":["https://openalex.org/I184558857"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5012870323"],"corresponding_institution_ids":["https://openalex.org/I184558857"],"apc_list":null,"apc_paid":null,"fwci":0.2975,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.49797741,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"289","last_page":"300"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/heap","display_name":"Heap (data structure)","score":0.9686023592948914},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8150640726089478},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7570205926895142},{"id":"https://openalex.org/keywords/allocator","display_name":"Allocator","score":0.6870124340057373},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3340255320072174},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.30285078287124634},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1814863681793213}],"concepts":[{"id":"https://openalex.org/C134757568","wikidata":"https://www.wikidata.org/wiki/Q274089","display_name":"Heap (data structure)","level":2,"score":0.9686023592948914},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8150640726089478},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7570205926895142},{"id":"https://openalex.org/C162262903","wikidata":"https://www.wikidata.org/wiki/Q343527","display_name":"Allocator","level":2,"score":0.6870124340057373},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3340255320072174},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.30285078287124634},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1814863681793213}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/spw54247.2022.9833896","is_oa":false,"landing_page_url":"https://doi.org/10.1109/spw54247.2022.9833896","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Security and Privacy Workshops (SPW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1459231281","https://openalex.org/W1496222301","https://openalex.org/W1992145496","https://openalex.org/W2035714433","https://openalex.org/W2043284163","https://openalex.org/W2073338313","https://openalex.org/W2080942732","https://openalex.org/W2092619407","https://openalex.org/W2099382052","https://openalex.org/W2113864883","https://openalex.org/W2137693710","https://openalex.org/W2141282920","https://openalex.org/W2154795299","https://openalex.org/W2162800072","https://openalex.org/W2165597437","https://openalex.org/W2168200704","https://openalex.org/W2765857833","https://openalex.org/W2857435418","https://openalex.org/W2889334792","https://openalex.org/W2949737282","https://openalex.org/W2962879711","https://openalex.org/W2973401049","https://openalex.org/W2984993098","https://openalex.org/W2985831349","https://openalex.org/W3157154729","https://openalex.org/W3182829891","https://openalex.org/W4302784197","https://openalex.org/W6628302897","https://openalex.org/W6629841029","https://openalex.org/W6750652679","https://openalex.org/W6754459196","https://openalex.org/W6763676922","https://openalex.org/W6794102932","https://openalex.org/W7057006497"],"related_works":["https://openalex.org/W2920417665","https://openalex.org/W4379518516","https://openalex.org/W3033802101","https://openalex.org/W2766468145","https://openalex.org/W92825922","https://openalex.org/W3104774169","https://openalex.org/W2486766535","https://openalex.org/W2944895246","https://openalex.org/W4322751585","https://openalex.org/W2515904313"],"abstract_inverted_index":{"Heap":[0,26,152,195],"layout":[1,10,27,50,127,190,198],"manipulation":[2,28,128,191,199],"\u2014":[3,17],"the":[4,8,12,15,40,49,52,114,125,151,188,194],"act":[5],"of":[6,14,51,67,88,177,181],"changing":[7],"heap":[9,24,61,126,159,189,197],"to":[11,39,92,106,124,137,142,157,169,187],"benefit":[13],"attacker":[16],"is":[18,29,75],"a":[19,30,64,155,184],"key":[20],"challenge":[21],"when":[22],"exploiting":[23],"vulnerabilities.":[25],"hard":[31],"problem":[32],"even":[33,45],"for":[34,63,210],"experienced":[35],"exploit":[36,212],"developers,":[37],"due":[38],"complex":[41,97],"ways":[42],"in":[43],"which":[44,182],"simple":[46],"operations":[47],"affect":[48],"heap.":[53],"Furthermore,":[54],"different":[55,60],"allocators":[56],"can":[57],"produce":[58],"vastly":[59],"layouts":[62],"given":[65],"set":[66],"operations,":[68],"and":[69,78,98,171,201],"understanding":[70],"these":[71],"internal":[72],"implementation":[73],"differences":[74],"extremely":[76],"time-consuming":[77],"error-prone.":[79],"Existing":[80],"work":[81,105],"either":[82],"focuses":[83],"only":[84],"on":[85,140],"specific":[86],"types":[87],"applications,":[89],"requires":[90,145],"access":[91],"source":[93],"code,":[94],"or":[95],"produces":[96],"opaque":[99],"solutions":[100,123],"needing":[101],"additional":[102],"reverse":[103],"engineering":[104],"complete":[107],"exploits.In":[108],"this":[109],"work,":[110],"we":[111],"propose":[112],"Hack":[113,150,193],"Heap:":[115],"an":[116,134],"online":[117],"puzzle":[118],"game":[119,131],"that":[120],"provides":[121,154],"direct":[122],"problem.":[129,192],"The":[130],"comes":[132],"with":[133],"extensive":[135],"tutorial":[136],"guide":[138],"players":[139],"how":[141],"play,":[143],"but":[144],"no":[146],"Computer":[147],"Science":[148],"knowledge.":[149],"also":[153],"toolchain":[156],"generate":[158],"vulnerability":[160],"puzzles":[161,173],"from":[162,174],"unmodified":[163],"real-world":[164,185],"applications.":[165],"We":[166],"were":[167],"able":[168],"create":[170],"solve":[172],"2":[175],"out":[176],"3":[178],"CVEs,":[179],"both":[180],"reflected":[183],"solution":[186],"makes":[196],"easier":[200],"hopefully":[202],"more":[203],"fun,":[204],"without":[205],"sacrificing":[206],"important":[207],"information":[208],"needed":[209],"practical":[211],"development.":[213]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
