Видео с ютуба Heapbleed
Patroklos Argyroudis Project Heapbleed
ZeroNights 2014 Patroklos Argyroudis Project Heapbleed
DEF CON 26 - Sanat Sharma - House of Roman a Leakless Heap Fengshui to Achieve RCE on PIE Binaries
Black Hat USA 2010: Understanding Fragmentation Heap: From Allocation to Exploitation 1/4
#HITB2012AMS D2T2 - Steven Seeley - Ghost in the Windows 7 Allocator
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector
Day 1 Part 4: Exploits1: Introduction to Software Exploits
Black Hat USA 2012 - Exploiting The Jemalloc Memory Allocator: Owning Firefox's Heap
DEFCON 15: Remedial Heap Overflows: dlmalloc style
RuhrSec 2019: "Greybox Automatic Exploit Generation for Heap Overflows", Sean Heelan
#HITBGSEC 2018 D1: Turning Memory Errors Into Code Execution With Client-Side Compilers - R. Gawlik
REcon 2014 25 - Exploit tips and techniques (William Peteroy)
Understanding & Breaking The Heap
BalCCon2k14 - Aleksandar Pejic & Andrija Prcic - Embedded Linux device drivers
Thirty Seven Colossal SCTP Facts Every Executive Must Know
CONFidence 2014: Preventing violation of memory safety in C/C++ software - Andreas Bogk
GOFA
CNIT 127: 5: Heap overflows