Chapter 21 Advanced Static Analysis with IDA Pro
Chapter 22 Advanced Reverse Engineering
Chapter 23 Client-Side Browser Exploits
Chapter 24 Exploiting the Windows Access Control Model
Chapter 25 Intelligent Fuzzing with Sulley
Chapter 26 From Vulnerability to Exploit
Chapter 27 Closing the Holes: Mitigation
3.12.166.131