Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks |
40th IEEE Symposium on Security and Privacy
|
Bypassing Clang's SafeStack for Fun and Profit |
Black Hat Europe 2016
|
Flip Feng Shui: Rowhammering the VM's Isolation |
Black Hat Europe 2016
|
Over the Edge: Silently Owning Windows 10's Secure Browser |
Black Hat USA 2016
|
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector |
37th IEEE Symposium on Security and Privacy
|