Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]
1 introduction
Introduction to Software Exploitation Corey K.. All materials is licensed under a Creative Commons Share Alike license.
Fighting buffer overflows with Address Space Layout Randomization
Advanced Buffer Overflow Methods Itzik Kotler [[email protected]]
A survey of Buffer overflow exploitation on HTC touch mobile phone Advanced Defense Lab CSIE NCU Chih-Wen Ou.
IEEE Security and Privacy , Vol 2, no.4, July 2004 . Presented by
Introduction to Software Exploitation