/memory_corruption_paper

paper written for an independent study I took in 2012. Uses the Protostar and Fusion VMs (Protostar primarily) from http://exploit-exercises.com/ to explore basics of stack and heap based buffer overflows.

Primary LanguageCOtherNOASSERTION

Watchers