This repository contains the source of "ARM Binary Exploitaiton" book.
- A Short Guide on ARM Exploitation
- ARM EXPLOITATION FOR IoT - Just an introduction
- EXPLOITING ARM LINUX SYSTEMS An introduction
- funkysh. Into my ARMs: Developing StrongARM/Linux shellcode. Phrack, 58, Dec. 2001
- How to create a shellcode on ARM architecture ?
- INTRODUCTION TO WRITING ARM SHELLCODE
- Czarnowski, A. Shellcoding ARM. Virus Bulletin, January 2013, p.9.
- Czarnowski, A. Shellcoding ARM: part 2. Virus Bulletin, March 2013, p.14.
- Czarnowski, A. Shellcoding ARM: part 3. Virus Bulletin, April 2013, p.27.
- phrack Issue 66 Article 12 Alphanumeric RISC ARM Shellcode by Yves Younan and Pieter Philippaerts
- Younan, Yves, et al. "Filter-resistant code injection on ARM." Journal in computer virology 7.3 (2011): 173-188.
- Kumar, Pratik, Nagendra Chowdary, and Anish Mathuria. "Alphanumeric Shellcode Generator for ARM Architecture." International Conference on Security, Privacy, and Applied Cryptography Engineering. Springer, Berlin, Heidelberg, 2013.
- Arm Alphanumeric Shellcode
- ARMv8 Shellcodes from 'A' to 'Z'
- RET2ZP — ARM binary exploitation Hola Armigo WriteUP
- ARM Exploitation with Raspberry Pi: ARM Ret-to-Libc
- Demystifying "Return-to-Zero-Protection" on ARM
- ARM Ret2ZP
- Itzhak(Zuk) Avraham. "Non-Executable Stack ARM Exploitation Research Paper." In BlackHat Security Convention, 2011.
- Huang, Zi-Shun, and Ian G. Harris. "Return-oriented vulnerabilities in ARM executables." 2012 IEEE Conference on Technologies for Homeland Security (HST). IEEE, 2012.
- arm rop 기법
- ROP 공격에 대한 ARM / x86 의 근본적인 차이점
- INTRODUCTION TO ROP ON ARM32
- Le, Long. "Arm exploitation ropmap." BlackHat USA (2011).
- Davi, Lucas, et al. Return-oriented programming without returns on ARM. Technical Report HGI-TR-2010-002, Ruhr-University Bochum, 2010.
- Kornau, Tim. Return oriented programming for the ARM architecture. Diss. Master’s thesis, Ruhr-Universität Bochum, 2010.