<s>
In	O
computer	O
security	O
,	O
heap	B-General_Concept
feng	I-General_Concept
shui	I-General_Concept
(	O
also	O
known	O
as	O
heap	O
grooming	O
)	O
is	O
a	O
technique	O
used	O
in	O
exploits	O
to	O
facilitate	O
arbitrary	O
code	O
execution	O
.	O
</s>
<s>
The	O
paper	O
often	O
credited	O
with	O
naming	O
the	O
technique	O
,	O
"	O
Heap	B-General_Concept
Feng	I-General_Concept
Shui	I-General_Concept
in	O
JavaScript	O
"	O
,	O
used	O
it	O
to	O
refer	O
to	O
an	O
exploit	O
in	O
which	O
a	O
dangling	B-Error_Name
pointer	I-Error_Name
was	O
aligned	O
with	O
a	O
portion	O
of	O
an	O
attacker-controlled	O
chunk	O
.	O
</s>
