Digging for IE11 Sandbox Escapes |
Black Hat USA 2014
|
The Forger’s Art: Exploiting XML Digital Signature Implementations |
44CON 2013
|
A Link to the Past: Abusing Symbolic Links on Windows |
INFILTRATE 2015
|
COM in Sixty Seconds! (well minutes more likely) |
INFILTRATE 2017
|
Reflecting on Reflection - Exploiting Reflection Vulnerabilities in Managed Languages |
CanSecWest 2013
|