The Power of Data-Oriented Attacks: Bypassing Memory Mitigation Using Data-Only Exploitation Techniques |
Black Hat Asia 2017
|
Shellcodes are for the 99% |
CanSecWest 2018
|
Combating the Advanced Memory Exploitation Techniques: Detecting ROP with Memory Information Leak |
CanSecWest 2014
|