Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
Abusing Silent Mitigations - Understanding Weaknesses Within Internet Explorers Isolated Heap and MemoryProtection Black Hat USA 2015
Abusing Silent Mitigations RECON 2015
Blowing up the Celly - Building Your Own SMS/MMS Fuzzer DEF CON 22
Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways Black Hat USA 2014
L’art de l’Évasion: Modern VMWare Exploitation techniques INFILTRATE 2018