Check out the new USENIX Web site. next up previous
Next: About this document ... Up: Engineering Heap Overflow Exploits Previous: Conclusions

Bibliography

1
Flake, H. Third Generation Exploitation. Blackhat Briefings Windows 2002.

2
Sotirov, A. Heap Feng Shui in JavaScript. Blackhat Europe 2007.



jake 2008-07-14