Automated Use-After-Free Detection and Exploit Mitigation: How Far Have We Gone? | IEEE Journals & Magazine | IEEE Xplore