Abusing Adobe Reader’s JavaScript APIs |
DEF CON 23
|
High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC |
DEF CON 23
|
Abusing Silent Mitigations - Understanding Weaknesses Within Internet Explorers Isolated Heap and MemoryProtection |
Black Hat USA 2015
|
Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways |
Black Hat USA 2014
|