Next:
About this document ...
Up:
Engineering Heap Overflow Exploits
Previous:
Conclusions
Bibliography
1
Flake, H.
Third Generation Exploitation
. Blackhat Briefings Windows 2002.
2
Sotirov, A.
Heap Feng Shui in JavaScript
. Blackhat Europe 2007.
jake 2008-07-14