Archives
- Fri 05 May 2023
 - Competing in Pwn2Own ICS 2022 Miami: Exploiting a zero click remote memory corruption in ICONICS Genesis64
 - Sat 11 June 2022
 - Pwn2Own 2021 Canon ImageCLASS MF644Cdw writeup
 - Sat 26 March 2022
 - Competing in Pwn2Own 2021 Austin: Icarus at the Zenith
 - Thu 15 July 2021
 - Building a new snapshot fuzzer & fuzzing IDA
 - Thu 15 April 2021
 - Reverse-engineering tcpip.sys: mechanics of a packet of the death (CVE-2021-24086)
 - Tue 17 November 2020
 - Modern attacks on the Chrome browser : optimizations and deoptimizations
 - Mon 17 June 2019
 - A journey into IonMonkey: root-causing CVE-2019-9810.
 - Thu 09 May 2019
 - Circumventing Chrome's hardening of typer bugs
 - Mon 28 January 2019
 - Introduction to TurboFan
 - Mon 19 November 2018
 - Introduction to SpiderMonkey exploitation.
 - Sat 14 July 2018
 - CVE-2017-2446 or JSC::JSGlobalObject::isHavingABadTime.
 - Thu 17 May 2018
 - Breaking ledgerctf's AES white-box challenge
 - Sun 11 March 2018
 - beVX challenge on the operation table
 - Fri 01 December 2017
 - Debugger data model, Javascript & x64 exception handling
 - Sat 05 August 2017
 - Binary rewriting with syzygy, Pt. I
 - Wed 21 December 2016
 - happy unikernels
 - Sun 27 November 2016
 - Token capture via an llvm-based analysis pass
 - Tue 18 August 2015
 - Keygenning with KLEE
 - Sun 08 February 2015
 - Spotlight on an unprotected AES128 white-box implementation
 - Sat 11 October 2014
 - Taming a wild nanomite-protected MIPS binary with symbolic execution: No Such Crackme
 - Sat 06 September 2014
 - Dissection of Quarkslab's 2014 security challenge
 - Wed 30 April 2014
 - Corrupting the ARM Exception Vector Table
 - Thu 17 April 2014
 - Deep dive into Python's VM: Story of LOAD_CONST bug
 - Tue 11 March 2014
 - First dip into the kernel pool : MS10-058
 - Sat 12 October 2013
 - Having a look at the Windows' User/Kernel exceptions dispatcher
 - Mon 16 September 2013
 - Breaking Kryptonite's obfuscation: a static analysis approach relying on symbolic execution
 - Mon 09 September 2013
 - Pinpointing heap-related issues: OllyDbg2 off-by-one story
 - Sat 31 August 2013
 - Some thoughts about code-coverage measurement with Pin
 - Sat 24 August 2013
 - Regular expressions obfuscation under the microscope