×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
asia-17-Sun-The-Power-Of-Data-Oriented-Attacks-Bypassing-Memory-Mitigation-Using-Data-Only-Exploitation-Technique.pdf
Home
/
Discover
/
paper.bobylive.com
/
Meeting_Papers
/
BlackHat
/
Asia-2017
/
Parent Folder
asia-17-Sun-The-Power-Of-Data-Oriented-Attacks-Bypassing-Memory-Mitigation-Using-Data-Only-Exploitation-Technique.pdf
PDF
4 years ago
4.25 MB
Copy Link
asia-17-Sun-Never-Let-Your-Guard-Down-Finding-Unguarded-Gates-To-Bypass-Control-Flow-Guard-With-Big-Data.pdf
PDF
4 years ago
2.82 MB
Copy Link
asia-17-Turpin-Phishing-For-Funds-Understanding-Business-Email-Compromise.pdf
PDF
4 years ago
5.52 MB
Copy Link
asia-17-Schwarz-Hello-From-The-Other-Side-SSH-Over-Robust-Cache-Covert-Channels-In-The-Cloud.pdf
PDF
4 years ago
4.26 MB
Copy Link
asia-17-Schwarz-Hello-From-The-Other-Side-SSH-Over-Robust-Cache-Covert-Channels-In-The-Cloud-wp.pdf
PDF
4 years ago
298.98 kB
Copy Link
asia-17-Schwarz-Hello-From-The-Other-Side-SSH-Over-Robust-Cache-Covert-Channels-In-The-Cloud-tool.zip
ZIP
4 years ago
25.17 kB
Copy Link
asia-17-Nesterov-All-Your-Emails-Belong-To-Us-Exploiting-Vulnerable-Email-Cclients-Via-Domain-Name-Collision.pdf
PDF
4 years ago
2.23 MB
Copy Link
asia-17-Nesterov-All-Your-Emails-Belong-To-Us-Exploiting-Vulnerable-Email-Cclients-Via-Domain-Name-Collision-wp.pdf
PDF
4 years ago
472.89 kB
Copy Link
asia-17-Moreira-Drop-The-Rop-Fine-Grained-Control-Flow-Integrity-For-The-Linux-Kernel.pdf
PDF
4 years ago
1.10 MB
Copy Link
asia-17-Michalevsky-MASHABLE-Mobile-Applications-Of-Secret-Handshakes-Over-Bluetooth-LE.pdf
PDF
4 years ago
3.09 MB
Copy Link
asia-17-Michalevsky-MASHABLE-Mobile-Applications-Of-Secret-Handshakes-Over-Bluetooth-LE-wp.pdf
PDF
4 years ago
555.47 kB
Copy Link
asia-17-Matrosov-The-UEFI-Firmware-Rootkits-Myths-And-Reality.pdf
PDF
4 years ago
3.30 MB
Copy Link
asia-17-Luo-Anti-Plugin-Don't-Let-Your-App-Play-As-An-Android-Plugin.pdf
PDF
4 years ago
15.12 MB
Copy Link
asia-17-Luo-Anti-Plugin-Don't-Let-Your-App-Play-As-An-Android-Plugin-wp.pdf
PDF
4 years ago
2.74 MB
Copy Link
asia-17-Liu-Dig-Into-The-Attack-Surface-Of-PDF-And-Gain-100-CVEs-In-1-Year.pdf
PDF
4 years ago
1.12 MB
Copy Link
asia-17-Liu-Dig-Into-The-Attack-Surface-Of-PDF-And-Gain-100-CVEs-In-1-Year-wp.pdf
PDF
4 years ago
162.08 kB
Copy Link
asia-17-Li-Cross-The-Wall-Bypass-All-Modern-Mitigations-Of-Microsoft-Edge.pdf
PDF
4 years ago
1.18 MB
Copy Link
asia-17-Law-Domo-Arigato-Mr-Roboto-Security-Robots-A-La-Unit-Testing.pdf
PDF
4 years ago
23.84 MB
Copy Link
asia-17-Law-Domo-Arigato-Mr-Roboto-Security-Robots-A-La-Unit-Testing-wp.pdf
PDF
4 years ago
21.88 MB
Copy Link
asia-17-Korchagin-Exploiting-USBIP-In-Linux.pdf
PDF
4 years ago
633.16 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.