1. 2. Return Oriented Programming(ROP) Based Exploits- Part I 3. Exploit - ex·ploitto use selfishly for one's own ends 4. Exploit DiscoveryBig space in computer security…
1. An introduction to the Katsuni theorem and its application to sandboxing and software emulation Jonathan Brossard (Toucan System) 25/09/2013 2. Who am I ? - Security researcher,…