Pwning Microsoft Edge Browser: From Memory Safety Vulnerability to Remote Code Execution |
POC2018
|
Bypassing Memory Mitigations Using Data-Only Exploitation Techniques (Part II) |
HITBSecConf2017 – Amsterdam
|
The Power of Data-Oriented Attacks: Bypassing Memory Mitigation Using Data-Only Exploitation Techniques |
Black Hat Asia 2017
|
Shellcodes are for the 99% |
CanSecWest 2018
|
BadWinmail and Email Security |
CanSecWest 2016
|
Combating the Advanced Memory Exploitation Techniques: Detecting ROP with Memory Information Leak |
CanSecWest 2014
|
Exploit Detection |
CanSecWest 2014
|