Good Start For The Lecture

  • Hacking - The Art of Exploitation by Jon Erickson (link)
    • a bit old, explanations for Intel 32 bit binaries, but still a good book!
  • Practical Binary Analysis by Dennis Andriesse (link)
    • use this more as a reference for specific topics
  • Secure Coding in C and C++ by Robert C. Seacord (link)
    • don’t read this book completely, just go into a couple of chapters and get an overview

Further Reading

Reverse Engineering

  • Reverse Engineering For Beginners by Dennis Yurichev - online and free (link)
  • Learning Linux Binary Analysis by Ryan “elfmaster” O’Neill (link)
  • Practical Malware Analysis by Michael Sikorski and Andrew Honig (link)

Computer Systems and System Programming

  • Computer Systems: A Programmer’s Perspective by Randal E. Bryant and David R. O’Hallaron (link)
  • Linux Programming Interface by Michael Kerrisk (link)


  • The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
    by Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters; Part III Linux Memory Forensics, p. 575ff (link)

Bug Hunting / Exploitation

  • A Bug Hunter’s Diary by Tobias Klein (there is also a German version of the book) (link)
  • Buffer Overflows und Format-String-Schwachstellen: Funktionsweisen, Exploits und Gegenma├čnahmen
    by Tobias Klein (old but gold; only used books available but you could check the libraries; only in German) (link)