Cloak & Dagger: From Two Permissions to Complete Control of the UI Feedback Loop |
Black Hat USA 2017
|
Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX |
Black Hat USA 2016
|
HDFI: Hardware-Assisted Data-Flow Isolation |
37th IEEE Symposium on Security and Privacy
|
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search |
37th IEEE Symposium on Security and Privacy
|
Abusing Performance Optimization Weaknesses to Bypass ASLR |
Black Hat USA 2014
|
Exploiting Unpatched iOS Vulnerabilities for Fun and Profit |
Black Hat USA 2014
|
From Zygote to Morula: Fortifying Weakened ASLR on Android |
35th IEEE Symposium on Security and Privacy
|
Symmetric Key Primitives |
RSAC USA 2012
|