Memory Corruption Courses
Black Hat via YouTube WebKit Everywhere - Secure or Not?
Black Hat via YouTube DTM Components - Shadow Keys to the ICS Kingdom
Black Hat via YouTube Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells
Black Hat via YouTube Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells
Black Hat via YouTube Java Every-Days - Exploiting Software Running on 3 Billion Devices
Black Hat via YouTube BlackBerryOS 10 from a Security Perspective
Black Hat via YouTube The Path Towards Automated Heap Exploitation
Cooper via YouTube Bug Hunting Using Symbolic Virtual Machines - Hack.lu 2017
Cooper via YouTube Mitigating Linux Kernel Memory Corruptions with ARM Memory Tagging
Linux Foundation via YouTube