This walk-through is based on the demonstration I gave at Case Western Reserve University on October 6, 2010. Actually, I shouldn’t take all of the credit for it: we implemented these exploits as a large group. Go team!
The README provides a lot of information on the basic theory. I have placed the documentation for the exploits directly inside of the exploit code. I have a feeling that I will need to flesh out some of the exploit details a little further, but I wanted to release this sooner rather than later. Please let me know if there are any gaps, and I will fill in the details as I find time.
Thanks again to all the students at Case Western!