Pwn2Own

Results: 18



#Item
1Web browsers / Pwn2Own / Hacking / Vulnerability / Safari / Heap spraying / Google Chrome / Exploit / Buffer overflow / Arbitrary code execution / Internet Explorer / Privilege escalation

$hell on Earth: From Browser to System Compromise Matt Molinyawe, Abdul-Aziz Hariri, and Jasiel Spelman A Zero Day Initiative Research Paper

Add to Reading List

Source URL: documents.trendmicro.com

Language: English - Date: 2016-08-03 12:08:47
2Web browsers / Atom / IOS / Safari / Google Chrome / Firefox / Browser wars / Pwn2Own

Tech Requirements for Practice and Training Tests

Add to Reading List

Source URL: www.smarterbalanced.org

Language: English - Date: 2015-08-14 17:11:36
3C Standard Library / C dynamic memory allocation / Pwn2Own / Nim / Attack / Cyberwarfare / Exploit / Mathematics / Memory management / Computing

The Birth of a Complete IE11 Exploit Under the New Exploit Mitigations Yuki Chen Qihoo 360 Vulcan Team @guhe120

Add to Reading List

Source URL: syscan.org

Language: English
4Pwn2Own / Google Chrome / Safari / Firefox / Exploit / Internet Explorer / Software / Web browsers / News aggregators

Big browsers fall in Pwn2Own exploit competition

Add to Reading List

Source URL: techxplore.com

Language: English - Date: 2015-05-28 18:52:03
5Smartphones / ITunes / Multi-touch / IOS jailbreaking / IOS / Botnet / Pwn2Own / Safari / Libtiff / Software / IPhone / Computing

Consequences of a Jailbroken iDevice Part of the Reverse Engineering and Code Modification Prevention Umbrella

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-01-09 16:53:18
6BIOS / Unified Extensible Firmware Interface / Boot loaders / Windows NT / Cryptographic protocols / Pwn2Own / Windows 8 / Safari / Firefox / Software / Computing / Google Chrome

Security Now! #Windows Secure Boot  This week on Security Now! ● ●

Add to Reading List

Source URL: www.grc.com

Language: English - Date: 2015-03-24 11:50:39
7Safari / WebKit / Google Chrome / IOS / Software / Web browsers / Pwn2Own

Attacking WebKit Applications by exploiting memory corruption bugs Liang Chen @KeenTeam @chenliang0817 About me

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2015-04-02 00:45:05
8Software bugs / Address space layout randomization / Malware / Pointer / Vulnerability / Duqu / Pwn2Own / Heap overflow / Stack buffer overflow / Computer security / Computing / Cyberwarfare

Ken  Johnson,  Ma,  Miller   Microso1  Security  Engineering  Center  (MSEC)       Black  Hat  USA  2012    

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-08-13 16:23:01
9Heap feng shui / Address space layout randomization / C dynamic memory allocation / Heap / Feng shui / Pointer / Pwn2Own / D-ary heap / New / Computing / Computer programming / Software engineering

The Art of Leaks: The Return of Heap Feng Shui Ga1ois @NSFOCUS Security Labs Agenda

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2014-03-19 04:38:32
10Pwn2Own / RSA / Computer security conference

PacSec 2014 Security Conference Tokyo, November[removed]Event Overview & Introduction For Non Japan Based Corporations

Add to Reading List

Source URL: pacsec.jp

Language: English - Date: 2014-08-13 04:08:59
UPDATE