One of my side projects is as an adviser and panelist for the non-profit Internet Bug Bounty (IBB). We recently added Adobe Flash Player as in scope for rewards.Earlier today, David Rude colle
Author: Chris Evans
Recently, there’s been a reasonable amount of activity in the vtable protection space. Most of it is compiler-based. For example, there’s the GCC-based virtual table verification, aka.
Back in November 2012, a Chrome Releases blog post mysteriously stated: “Congratulations to Pink
Web browsers with some form of multi-process model are becoming increasingly common. Depending on the exact setup, there can be significant consequences for security posture and exploitation method