One, A. (2007). Smashing the stack for fun and profit (1996). Phrack, 7, 49.

Meer, H. (2010). The (almost) complete history of memory corruption attacks. Black Hat USA.

Bratus, S., Locasto, M. E., Patterson, M. L., Sassaman, L., & Shubina, A. (2011). Exploit programming: From buffer overflows to weird machines and theory of computation. USENIX; login, 36(6).

Van der Veen, V., Cavallaro, L., & Bos, H. (2012, September). Memory errors: the past, the present, and the future. In International Workshop on Recent Advances in Intrusion Detection (pp. 86-106). Springer Berlin Heidelberg.

Sotirov, A. (2007). Heap feng shui in javascript. Black Hat Europe.

Unruh, T., Shastry, B., Skoruppa, M., Maggi, F., Rieck, K., Seifert, J. P., & Yamaguchi, F. (2017). Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery. arXiv preprint arXiv:1704.02786.
Advertisement