Memory Corruption Courses
Hack In The Box Security Conference via YouTube JARVIS Never Saw It Coming - Hacking Machine Learning in Speech, Text and Face Recognition
44CON Information Security Conference via YouTube SyScan360'16 Singapore - Memory Corruption Is For Wussies
SyScan360 via YouTube Select Code Execution From Using SQLite
media.ccc.de via YouTube BLEEDINGBIT - Your APs Belong to Us
Black Hat via YouTube Ghost in the Machine: Challenges in Embedded Binary Security - Enigma 2017
USENIX Enigma Conference via YouTube Hacking Automatically - Applying Program Analysis to IoT
nullcon via YouTube Linux Vulnerabilities, Windows Exploits - Escalating Privileges with WSL
Recon Conference via YouTube Behind the Scenes of Intel Security and Manageability Engine
Black Hat via YouTube Exploitation of a Modern Smartphone Baseband
Black Hat via YouTube