Menu Open
Menu Close
Blog
Conference Talks
Tools
Advisories
Pages
Authors
Categories
Tags
Vulnerability Disclosure Policy
Chainspotting: Building Exploit Chains with Logic Bugs
Georgi Geshev
Robert Miller
Infiltrate 2018
Download slides here
#Others