Hacking: The Art of Exploitation

@inproceedings{Erickson2008HackingTA,
  title={Hacking: The Art of Exploitation},
  author={Jon Erickson},
  year={2008}
}
From the Publisher: Emphasizing a true understanding of the techniques as opposed to just breaking the rules, the author helps readers determine which areas are prone to attack and why. Unlike other so-called hacking guides, this book does not gloss over technical details, and includes detailed sections on stack-based overflows, heap based overflows, format string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. 

Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 60 CITATIONS

Visualizing Endpoint Security Technologies using Attack Trees

VIEW 5 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Hacking ético: impacto en la sociedad

VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Economic Factors of Vulnerability Trade and Exploitation

  • ACM Conference on Computer and Communications Security
  • 2017
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

AUTOMATED EXPLOIT GENERATION OF BINARY TARGETS BY LEVERAGING A CUSTOM FUZZING AND DEBUGGING FRAMEWORK

Samuel Cappella, Mike Jochen
  • 2013
VIEW 3 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

CounterMeasures: A game for teaching computer security

  • 2011 10th Annual Workshop on Network and Systems Support for Games
  • 2011
VIEW 3 EXCERPTS
HIGHLY INFLUENCED

A TEST BED FOR DETECTION OF BOTNET INFECTIONS IN LOW DATA RATE

VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Reversing to detect software vulnerabilities

  • 2017 12th Iberian Conference on Information Systems and Technologies (CISTI)
  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

Security Events and Vulnerability Data for Cybersecurity Risk Estimation.

  • Risk analysis : an official publication of the Society for Risk Analysis
  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

FILTER CITATIONS BY YEAR

2006
2019

CITATION STATISTICS

  • 6 Highly Influenced Citations