Flip Feng Shui: Rowhammering the VM's Isolation |
Black Hat Europe 2016
|
Over the Edge: Silently Owning Windows 10's Secure Browser |
Black Hat USA 2016
|
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector |
37th IEEE Symposium on Security and Privacy
|
Framing Signals — A Return to Portable Shellcode |
35th IEEE Symposium on Security and Privacy
|