Describir: Understanding and Defending Against Use-After-Free Vulnerabilities