2004-06-08 Analysis of the Exploitation Process (Securiteam) Security Documents x86 Linux 上における Stack exploitation, Heap exploitation, Function pointer exploitation, Format string exploitation, Return-to-libc exploitation の exploit 手法を解析したドキュメント。(info from SecuLog)