You are here |
blog.inhq.net | ||
| | | |
manybutfinite.com
|
|
| | | | Last week we looked at how the stack works and how stack frames are built during function prologues. Now it's time to look at the inverse process as stack frames are destroyed in function epilogues. | |
| | | |
rtx.meta.security
|
|
| | | | Technical writeups by Meta's Security folks, including Red Team. | |
| | | |
blog.quarkslab.com
|
|
| | | | Following our presentation at Black Hat USA, in this blog post we provide some details on CVE-2022-20233, the latest vulnerability we found on Titan M, and how we exploited it to obtain code execution on the chip. | |
| | | |
debugmo.de
|
|
| |