A STITCH IN TIME SAVES NINE: A CASE OF MULTIPLE OPERATING SYSTEM VULNERABILITY
EXPLOITING THE JEMALLOC MEMORY ALLOCATOR: OWNING FIREFOX'S HEAP
THE INFO LEAK ERA ON SOFTWARE EXPLOITATION
ARE YOU MY TYPE? - BREAKING .NET SANDBOXES THROUGH SERIALIZATION