<script>
export default {
  components: {},
  data () {
    return {};
  },
  computed: {},
  methods: {}
}
</script>

<template>
  <div>
    <h1 align="center">学术篇</h1>
    <el-divider></el-divider>
    <p>论文下载：链接：<a href="https://pan.baidu.com/s/1G-WFCzAU2VdrrsHqJzjGpw" target="_blank">https://pan.baidu.com/s/1G-WFCzAU2VdrrsHqJzjGpw</a> 密码：vhfw</p>
    <ul>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.1_ret2libc_without_calls.md" data-pid="160940">8.1 The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.2_rop_without_ret.md" data-pid="160951">8.2 Return-Oriented Programming without Returns</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.3_rop_rootkits.md" data-pid="160962">8.3 Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.4_ropdefender.md" data-pid="160973">8.4 ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.5_dop.md" data-pid="160975">8.5 Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.6_brop.md" data-pid="160976">8.6 Hacking Blind</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.7_jit-rop_defenses.md" data-pid="160977">8.7 What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.8_dta_and_fse.md" data-pid="160978">8.8 All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask)</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.9_symbolic_execution.md" data-pid="160979">8.9 Symbolic Execution for Software Testing: Three Decades Later</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.10_aeg.md" data-pid="160930">8.10 AEG: Automatic Exploit Generation</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.11_aslp.md" data-pid="160931">8.11 Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.12_aslr_on_the_line.md" data-pid="160932">8.12 ASLR on the Line: Practical Cache Attacks on the MMU</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.13_reverse_engineering.md" data-pid="160933">8.13 New Frontiers of Reverse Engineering</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.14_detecting_memory_allocators.md" data-pid="160934">8.14 Who Allocated My Memory? Detecting Custom Memory Allocators in C Binaries</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.15_emu_vs_real.md" data-pid="160935">8.15 EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.16_dynalog.md" data-pid="160936">8.16 DynaLog: An automated dynamic analysis framework for characterizing Android applications</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.17_actual_permissions.md" data-pid="160937">8.17 A Static Android Malware Detection Based on Actual Used Permissions Combination and API Calls</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.18_malware_markov.md" data-pid="160938">8.18 MaMaDroid: Detecting Android malware by building Markov chains of behavioral models</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.19_droidnative.md" data-pid="160939">8.19 DroidNative: Semantic-Based Detection of Android Native Code Malware</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.20_droidanalytics.md" data-pid="160941">8.20 DroidAnalytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.21_tracing_to_detect_spraying.md" data-pid="160942">8.21 Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.22_memory_checking.md" data-pid="160943">8.22 Practical Memory Checking With Dr. Memory</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.23_current_anti-rop.md" data-pid="160944">8.23 Evaluating the Effectiveness of Current Anti-ROP Defenses</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.24_runtime_re-randomization.md" data-pid="160945">8.24 How to Make ASLR Win the Clone Wars: Runtime Re-Randomization</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.25_angr.md" data-pid="160946">8.25 (State of) The Art of War: Offensive Techniques in Binary Analysis</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.26_driller.md" data-pid="160947">8.26 Driller: Augmenting Fuzzing Through Selective Symbolic Execution</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.27_firmalice.md" data-pid="160948">8.27 Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.28_cross_arch_bug.md" data-pid="160949">8.28 Cross-Architecture Bug Search in Binary Executables</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.29_dynamic_hooks.md" data-pid="160950">8.29 Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.30_prevent_brute_force_canary.md" data-pid="160952">8.30 Preventing brute force attacks against stack canary protection on networking servers</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.31_wysinwyx.md" data-pid="160953">8.31 WYSINWYX What You See Is Not What You eXecute</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.32_mayhem.md" data-pid="160954">8.32 Unleashing MAYHEM on Binary Code</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.33_ucklee.md" data-pid="160955">8.33 Under-Constrained Symbolic Execution: Correctness Checking for Real Code</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.34_veritesting.md" data-pid="160956">8.34 Enhancing Symbolic Execution with Veritesting</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.35_q.md" data-pid="160957">8.35 Q: Exploit Hardening Made Easy</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.36_survey_symbolic_execution.md" data-pid="160958">8.36 A Survey of Symbolic Execution Techniques</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.37_cute.md" data-pid="160959">8.37 CUTE: A Concolic Unit Testing Engine for C</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.38_tainteraser.md" data-pid="160960">8.38 TaintEraser: Protecting Sensitive Data Leaks Using Application-Level Taint Tracking</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.39_dart.md" data-pid="160961">8.39 DART: Directed Automated Random Testing</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.40_exe.md" data-pid="160963">8.40 EXE: Automatically Generating Inputs of Death</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.41_intpatch.md" data-pid="160964">8.41 IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.42_taintcheck.md" data-pid="160965">8.42 Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.43_dta++.md" data-pid="160966">8.43 DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.44_multiverse.md" data-pid="160967">8.44 Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.45_ramblr.md" data-pid="160968">8.45 Ramblr: Making Reassembly Great Again</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.46_freeguard.md" data-pid="160969">8.46 FreeGuard: A Faster Secure Heap Allocator</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.47_jop.md" data-pid="160970">8.47 Jump-Oriented Programming: A New Class of Code-Reuse Attack</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.48_uroboros.md" data-pid="160971">8.48 Reassembleable Disassembling</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.49_ioc.md" data-pid="160972">8.49 Understanding Integer Overflow in C/C++</a></li>
      <li style="margin-left: 2em;"><a target="_blank" href="https://www.bookstack.cn/read/CTF-All-In-One/doc-8.50_large_scale_embedded.md" data-pid="160974">8.50 A Large-Scale Analysis of the Security of Embedded Firmwares</a></li>
    </ul>
    <el-divider></el-divider>
</div>
</template>

<style scoped>
</style>