Notes related to Automatic generation of control flow hijacking exploits for software vulnerabilities
Papers related to Automatic generation of control flow hijacking exploits for software vulnerabilities
- Automatic exploit generation [avgerinos:cacm:2014]
- Automatic heap layout manipulation for exploitation [heelan:sec:2018]