Fig. 3From: From proof-of-concept to exploitableIllustration of heap-based vulnerability identification. Each heap object and pointer is associated with a memory tag. An extra status is attached to each memory objectBack to article page