Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks |
40th IEEE Symposium on Security and Privacy
|
RIDL: Rogue In-Flight Data Load |
40th IEEE Symposium on Security and Privacy
|
Flip Feng Shui: Rowhammering the VM's Isolation |
Black Hat Europe 2016
|
Over the Edge: Silently Owning Windows 10's Secure Browser |
Black Hat USA 2016
|
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector |
37th IEEE Symposium on Security and Privacy
|
Silently Breaking ASLR in the Cloud |
Black Hat Europe 2015
|
CAIN: Silently Breaking ASLR in the Cloud |
WOOT '15
|