Heap vulnerabilities have dominated the interest of the security research community for quite long time due to their potential of finding innovative exploitation ways. Starting
Read MoreIn my introductory post I had been talking about dynamic memory allocation and I referenced various solutions that are used to tackle this problem. In this post I am going to fo
Read MoreIn my last post I had been talking about the heap structure in the context of the ptmalloc allocator. I went through some basic concepts, like the arena, the sub-heaps and the c
Read MoreProgram code of SafeOpener: java import java.io.*; import java.util.*; public class SafeOpener { public static void main(String args[]) throws IOException { BufferedReade
Read MoreReverse engineering is the process of understanding the particular aspects of the program, which are listed below to identify the components of the system and the interrelations
Read More