Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks 40th IEEE Symposium on Security and Privacy
Bypassing Clang's SafeStack for Fun and Profit Black Hat Europe 2016
Flip Feng Shui: Rowhammering the VM's Isolation Black Hat Europe 2016
Over the Edge: Silently Owning Windows 10's Secure Browser Black Hat USA 2016
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector 37th IEEE Symposium on Security and Privacy