Return-oriented Programming Courses
Black Hat via YouTube Evaluation of the Executional Power in Windows Using Return Oriented Programming
IEEE via YouTube Spectre Attacks Exploiting Speculative Execution
IEEE via YouTube Return to the Zombie Gadgets - Undermining Destructive Code Reads via Code-Inference Attacks
IEEE via YouTube ROP is Still Dangerous - Breaking Modern Defenses
USENIX via YouTube How to Cook Cisco: Exploit Development for Cisco IOS - George Nosenko - Ekoparty Security Conference - 2017
Ekoparty Security Conference via YouTube ROP with a 2nd Stack, or This Exploit is a Recursive Fibonacci Sequence Generator
BSidesLV via YouTube Exploiting a Limited UAF on Ubuntu 22.04 to Achieve LPE
Hack In The Box Security Conference via YouTube Software Security Era - Past, Present, and Future
Hack In The Box Security Conference via YouTube Automatic Generation of ROP Chains
Hack In The Box Security Conference via YouTube