Resources and links
==================[ Item 1: Dynamic linking mystery ]==========
See https://github.com/sergeybratus/RE-basics-W22/tree/main/day2-src/why-no-lazy-linking.txt
==================[ Item 2: History of memory corruption exploits ]========================
A classic paper in Phrack:
http://phrack.org/issues/58/4.html – “The advanced return-into-lib(c) exploits: PaX case study”, Nergal, Phrach 58:4, 2001.
History overviews of exploitation techniques, which led to adoption of NX/DEP and ASLR:
https://thinkst.com/resources/papers/BlackHat-USA-2010-Meer-History-of-Memory-Corruption-Attacks-wp.pdf “Memory Corruption Attacks: The (almost) Complete History”, Haroon Meer, BlackHat 2010 (see Timeline at p.9)
https://langsec.org/papers/Bratus.pdf — “Exploit Programming: from Buffer Overflows to Weird Machines and Theory of Computation”, 2011.
==================[ Item 3: Abusing relocation entries ]===========
http://uninformed.org/?v=6&a=3&t=pdf – “Locreate: An Anagram for Relocate - Uninformed.org”
https://www.cs.dartmouth.edu/~sergey/wm/woot13-shapiro.pdf – “Weird Machines” in ELF: A Spotlight on the Underappreciated Metadata, Shapiro et al., USENIX WOOT’13