Introduction

Know thy enemy.

Understanding attacks that exploit the lack of memory safety in programs is vital to understanding the different types of memory safety as well as the tradeoffs between enforcing one kind of memory safety over another. Not all memory safety techniques are created equal.

Below are papers that describe how attacks exploit memory safety errors. Be sure to use them for research and not for "fun and profit."

Memory Safety Exploit Papers