19.01.2013 Views

Proceedings

Proceedings

Proceedings

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

DER HAMMER: X86-64 UND DAS UM-SCHIFFEN DES NX BITS<br />

REFERENCES 20<br />

References<br />

[1] AMD:<br />

http://developer.amd.com/documentation.aspx<br />

[2] x86-64 ABI:<br />

http://www.x86-64.org/documentation/abi.pdf<br />

[3] Description of buffer overflows:<br />

http://www.cs.rpi.edu/˜hollingd/netprog/notes/overflow/overflow<br />

[4] Advanced return into libc:<br />

http://www.phrack.org/phrack/58/p58-0x04<br />

[5] Return into libc:<br />

http://www.ussg.iu.edu/hypermail/linux/kernel/9802.0/0199.html<br />

[6] Return into libc:<br />

http://marc.theaimsgroup.com/?l=bugtraq&m=87602746719512<br />

[7] PaX:<br />

http:///pax.grsecurity.net<br />

[8] mallocoverflows:<br />

http://www.phrack.org/phrack/57/p57-0x09<br />

[9] John McDonald<br />

http://thc.org/root/docs/exploit_writing/sol-ne-stack.html<br />

[10] Borrowed code-chunks exploitation technique:<br />

http://www.suse.de/˜krahmer/bccet.tgz<br />

NO-NX<br />

123 |

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!