Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis | IEEE Conference Publication | IEEE Xplore