Capturing 0day Exploits with PERFectly Placed Hardware Traps
A Journey from JNDI/LDAP Manipulation to Remote Code Execution Dream Land
Adaptive Kernel Live Patching: An Open Collaborative Effort to Ameliorate Android N-Day Root Exploits
Intra-Process Memory Protection for Applications on ARM and x86: Leveraging the ELF ABI
Captain Hook: Pirating AVs to Bypass Exploit Mitigations
Brute-Forcing Lockdown Harddrive PIN Codes
PINdemonium: A DBI-Based Generic Unpacker for Windows Executable
Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages
O-checker: Detection of Malicious Documents Through Deviation from File Format Specifications
Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf
OSS Security Maturity: Time to Put On Your Big Boy Pants!
The Art of Reverse Engineering Flash Exploits
Over the Edge: Silently Owning Windows 10's Secure Browser