Neighborhood Techie
Tuesday, June 8, 2004
Analysis of the Exploitation Process
Insecure.org has a
pointer
to a paper entitled "
Analysis of the Exploitation Process
" which, at a minimum, has a decent description of the different types of memory attacks. It's a work-in-progress though.
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment