Return oriented programming
Smashing the Heap under Win2k Blackhat Briefings Windows 2002 Halvar Flake Reverse Engineer Blackhat Consulting Third Generation Exploitation.
Return-Oriented Programming: Exploits Without Code Injection
Riding the Overflow - Then and Now
The impact of p2p file distribution on paid content sales presentation
Smashing the Buffer
Zel H. Project Slide
Rich F. Project Slide
Ting F. Project Slide
Chung W. Project Slide
Defending against Return-Oriented Programming Vasilis Pappas Columbia University.