x86-64 buffer overflow exploits and the borrowed code chunks - SuSE
x86-64 buffer overflow exploits and the borrowed code chunks - SuSE
x86-64 buffer overflow exploits and the borrowed code chunks - SuSE
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
REFERENCES 20<br />
References<br />
[1] AMD:<br />
http://developer.amd.com/documentation.aspx<br />
[2] <strong>x86</strong>-<strong>64</strong> ABI:<br />
http://www.<strong>x86</strong>-<strong>64</strong>.org/documentation/abi.pdf<br />
[3] Description of <strong>buffer</strong> <strong>overflow</strong>s:<br />
http://www.cs.rpi.edu/˜hollingd/netprog/notes/<strong>overflow</strong>/<strong>overflow</strong>.<br />
[4] Advanced return into libc:<br />
http://www.phrack.org/phrack/58/p58-0x04<br />
[5] Return into libc:<br />
http://www.ussg.iu.edu/hypermail/linux/kernel/9802.0/0199.html<br />
[6] Return into libc:<br />
http://marc.<strong>the</strong>aimsgroup.com/?l=bugtraq&m=87602746719512<br />
[7] PaX:<br />
http:///pax.grsecurity.net<br />
[8] malloc <strong>overflow</strong>s:<br />
http://www.phrack.org/phrack/57/p57-0x09<br />
[9] John McDonald<br />
http://thc.org/root/docs/exploit_writing/sol-ne-stack.html<br />
[10] Borrowed <strong>code</strong>-<strong>chunks</strong> exploitation technique:<br />
http://www.suse.de/˜krahmer/bccet.tgz<br />
NO-NX