Heap Models for Exploit Systems