Not available

Modeling the exploitation and mitigation of memory safety vulns

Not available

Emulating DFU to Quickly Reverse and Exploit USB Devices

Detecting Bugs Using Decompilation and Dataflow Analysis

Not available

Maverick: Adding the Apple Touch to Qualcomm's Baseband Bootrom

Unravelling Windows 8 Security and the ARM Kernel

Rootkit in your Laptop: Hidden Code in your Chipset