Tuesday, June 8, 2004

Analysis of the Exploitation Process

Insecure.org has a pointer to a paper entitled "Analysis of the Exploitation Process" which, at a minimum, has a decent description of the different types of memory attacks. It's a work-in-progress though.