References:
Bratus et al. (2011) Exploit Programming - From Buffer Overflows to “Weird Machines” and Theory of Computation (from: langsec.org/pap...)
Brilliant.org (n.d.) Finite State Machines (from: brilliant.org/...)
Cook, Kees (2017) [GIT PULL] usercopy whitelisting for v4.15-rc1 Linux-Kernel Archive (from: lkml.iu.edu/hyp...)
Dullien, Thomas (2020) Weird Machines, Exploitability, and Provable Unexploitability (from: ieeexplore.iee...)
Sharwood, Simon (2017) Some ‘security people are f*cking morons’ Says Linus Torvalds (from: www.theregiste...)
Walls, Robert (2020) Lecture Notes: Old Man Glitch (from: cs4401.walls.ni...)
Zakovska, Sanja (2021) Devs watching QA test the product (from: / 1352557733787152389 )
Негізгі бет SSE[0] - Software, Vulnerabilities and Exploits
Пікірлер: 2