I. Introduction
Nowadays, memory corruption vulnerabilities have become one of the biggest threats to computer system security. Automatic exploitation generation (AEG) methods have been proposed to effectively exploit memory vulnerabilities. Currently, most AEG approaches have been used towards stack-based bugs [1], [2]. As for heap spatial vulnerabilities, existing AEG methods still face significant limitations.