Looking at the Attack Surfaces of the Kenwood DMX958XR IVI
November 21, 2024 | Connor Ford CONTINUE READINGBlog post
Abusing Arbitrary File Deletes to Escalate Privilege and Other Great Tricks
- March 17, 2022
Blog post
Clang Checkers and CodeQL Queries for Detecting Untrusted Pointer Derefs and Tainted Loop Conditions
- February 23, 2022
Blog post
Static Taint Analysis using Binary Ninja: A Case Study of MySQL Cluster Vulnerabilities
- February 15, 2022