Mateusz Jurczyk is a security researcher at Google Project Zero, and a vice- captain of the Dragon Sector CTF team. While being a big fan of memory corruption, his areas of interest are centered around low-level client software security, vulnerability exploitation and mitigation techniques. In his free time, Mateusz enjoys delving into the darkest corners of low-level kernel internals, with a strong emphasis on Microsoft Windows. He has spoken at numerous security conferences including Black Hat, REcon, SyScan, Ruxcon, PacSec and 44CON.
Bochspwn Reloaded: Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking