|
Reading materials
Cryptography
- Applied Cryptography by Bruce Schneier. John Wiley & Sons, 1996. ISBN 0-471-11709-9.
- Handbook of Applied Cryptography by Menezes, van Oorschot, and Vanstone.
- Introduction to Cryptography by Johannes Buchmann. Springer, 2004. ISBN 978-0-387-21156-5.
- Cryptographic libraries:
Control hijacking attacks
- Smashing The Stack For Fun And Profit, Aleph One.
- Bypassing non-executable-stack during exploitation using return-to-libc by c0ntex.
- Basic Integer Overflows, blexim.
- The C programming language (second edition) by Kernighan and Ritchie. Prentice Hall, Inc., 1988. ISBN 0-13-110362-8, 1998.
- Intel 80386 Programmer's Reference Manual, 1987.
Alternatively, in PDF format.
Much shorter than the full current Intel architecture manuals below, but often sufficient.
- IA-32 Intel Architecture Software Developer's Manuals,
Intel, 2009. Local copies:
Web security
OS security
Exploiting hardware bugs
Mobile devices
|
Questions or comments regarding 6.858? Send e-mail to the course staff at
6.858-staff@pdos.csail.mit.edu.
Top //
6.858 home //
Last updated Friday, 29-Jan-2016 11:49:41 EST
|
|