Search for "ar3itrary" returned 243 results

46 min
SELECT code_execution FROM * USING SQLite;
--Gaining code execution using a malicious SQLite database

59 min
Memory Deduplication: The Curse that Keeps on Giving
A tale of 3 different memory deduplication based…

60 min
Intel Management Engine deep dive
Understanding the ME at the OS and hardware level

46 min
Making machines that make
rapid prototyping of digital fabrication and…

61 min
Safe and Secure Drivers in High-Level Languages
How to write PCIe drivers in Rust, go, C#, Swift, Haskell,…

39 min
Transmission Control Protocol
TCP/IP basics

57 min
The Layman's Guide to Zero-Day Engineering
A demystification of the exploit development lifecycle

40 min
A year of surveillance in France: a short satirical tale by La Quadrature du Net
From the so-called Country of human rights to a…

61 min
Deploying TLS 1.3: the great, the good and the bad
Improving the encrypted the web, one round-trip at a time

44 min
Disclosure DOs, Disclosure DON'Ts
Pragmatic Advice for Security Researchers

47 min
Bug class genocide
Applying science to eliminate 100% of buffer overflows

58 min
Operation Triangulation
What You Get When Attack iPhones of Researchers

60 min