Breaking Samsung's ARM TrustZone (BlackHat'19 slides) [PDF] Reverse Engineering |
- Breaking Samsung's ARM TrustZone (BlackHat'19 slides) [PDF]
- Reverse Engineer Tut
- preview - new vb6 pcode disassembler and debugger
- The state of advanced code injections
- Automatic Wireless Protocol Reverse Engineering (WOOT'19) [PDF]
- Simple Anti-RE Trick
- Unicorefuzz: On the Viability of Emulation for Kernelspace Fuzzing (WOOT'19) [PDF]
Breaking Samsung's ARM TrustZone (BlackHat'19 slides) [PDF] Posted: 13 Aug 2019 12:18 AM PDT |
Posted: 13 Aug 2019 09:00 AM PDT |
preview - new vb6 pcode disassembler and debugger Posted: 13 Aug 2019 08:21 AM PDT |
The state of advanced code injections Posted: 13 Aug 2019 04:09 AM PDT |
Automatic Wireless Protocol Reverse Engineering (WOOT'19) [PDF] Posted: 13 Aug 2019 12:19 AM PDT |
Posted: 12 Aug 2019 04:50 PM PDT |
Unicorefuzz: On the Viability of Emulation for Kernelspace Fuzzing (WOOT'19) [PDF] Posted: 13 Aug 2019 12:20 AM PDT |
You are subscribed to email updates from Reverse Engineering. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment