When Memory Corruption Met Concurrency: Vulnerabilities in Concurrent Programs | Publicación