BingSun

Search this site
  • Home
  • How to Survive the Hardware-assisted Control-flow Integrity Enforcement
  • JIT Spraying Never Dies - Bypass CFG By Leveraging WARP Shader JIT Spraying
  • Shellcodes are for the 99%
  • The Battle For Protected Memory
  • The Power of Data-Oriented Attacks: Bypassing Memory Mitigation Using Data-Only Exploitation Technique
  • Unearth Hidden Treasures In The Stack - Bypass CFG Via Stack Data Corruption
  • Sitemap

The Battle For Protected Memory

Č
Updating...
Ċ
The Battle For Protected Memory - Attack Read-only Memory Using Advanced Data-only Attack Technique (Part I).pdf
(2971k)
sun bing,
Dec 27, 2017, 6:23 PM
v.1
ď
Ċ
The Battle For Protected Memory - Attack Read-only Memory Using Advanced Data-only Attack Technique (Part II).pdf
(7103k)
sun bing,
Dec 29, 2017, 4:52 PM
v.1
ď
Ċ
争夺保护内存之战-使用高级纯数据利用技术攻击只读内存(上).pdf
(2925k)
sun bing,
Dec 27, 2017, 6:22 PM
v.1
ď
Ċ
争夺保护内存之战-使用高级纯数据利用技术攻击只读内存(下).pdf
(7358k)
sun bing,
Dec 29, 2017, 4:52 PM
v.1
ď
Comments

Sign in|Recent Site Activity|Report Abuse|Print Page|Powered By Google Sites