Abusing Silent Mitigations - Understanding Weaknesses Within Internet Explorers Isolated Heap and MemoryProtection |
Black Hat USA 2015
|
Abusing Silent Mitigations |
RECON 2015
|
Blowing up the Celly - Building Your Own SMS/MMS Fuzzer |
DEF CON 22
|
Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways |
Black Hat USA 2014
|
L’art de l’Évasion: Modern VMWare Exploitation techniques |
INFILTRATE 2018
|