Smashing the stack for fun and profit, Aleph OneOn the Effectiveness of Address-Space Randomization, VariousThe Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86), H. ShachamBasic Integer Overflows, bleximReverse Stack Execution, Various
Onix: A Distributed Control Platform for Large-scale Production Networks, Various (USENIX 2010)Advances in Format String Exploitation, gera & riq- Intel x86 considered harmful, J. Rutkowska
- Abusing Windows Management Instrumentation (WMI) to Build a Persistent, Asyncronous, and Fileless Backdoor, M. Graeber (BlackHat '15)
- Ah! Universal Android Rooting is Back!, W. Xu (BlackHat '15)
- PoC||GTFO series.
- What You Submit is Who You Are: A Multi-Modal Approach for Deanonymizing Scientific Publications, Various
- Control-Flow Bending: On the Effectiveness of Control-Flow Integrity, Various
- CAIN: Silently Breaking ASLR in the Cloud, Various
- Hot-Patching a Web Server: a Case Study of ASAP Code Repair, M. Payer, T. Gross
- String Oriented Programming: When ASLR is not Enough, same authors as above
- Analyzing HTTPS Encrypted Traffic to Identify User's Operating System, Browser and Application, Various