Back
About Research / Publications Press Blog Contact
Menu
  • About
  • Research / Publications
  • Press
  • Contact

Research / Publications

arrow Bug Hunting: From Advisory to PoC (Triggering CVE-2015-1929)
arrow Use After Free Bugs & Browser Exploitation – Turkish
arrow Windows Mobile ARM Exploitation – Turkish
arrow CVE-2012-4792 IE Use After Free Analysis – Turkish
arrow Heap Overflow and Exploitation – Turkish
arrow Discovering RPC Vulnerabilities – Turkish
arrow Microsoft Office Remote Code Execution - CVE-2015-6093
arrow Microsoft Windows Mobile Double Free Vulnerability - 2010 (no-cve)
arrow Windows Kernel Information Disclosure Vulnerability - CVE-2017-0167
arrow PROGEA Movicon Remote Information Disclosure - CVE-2014-0778
arrow Schneider Electric IGSS SCADA Memory Corruption - CVE-2011-4537
arrow Invensys WonderWare SCADA Buffer Overflow Vulnerability - CVE-2012-0257
arrow 3S CoDeSys SCADA Buffer Overflow Vulnerability
arrow HTC Touch2 Media Player Memory Corruption Vulnerability
arrow Adobe Shockwave Player Memory Corruption CVE-2011-2122
arrow Speaker at POC2015, Korea: Breaking Font Parsers
arrow Speaker at CODEBLUE 2014, Japan : SCADA Software or Swiss Cheese Software?
arrow Speaker at Swiss Cyber Storm 2011, Switzerland: Bug Hunting in Windows Mobile
arrow Speaker at CONFidence 2010, Poland: Analysis of Software Vulnerabilities