Introduction |
|
5 | (4) |
|
Laphroaig screams high five to the heavens! |
|
|
9 | (138) |
|
|
14 | (18) |
|
|
14:03 Concerning Desert Studies |
|
|
32 | (5) |
|
|
14:04 Texting with Flush+Reload |
|
|
37 | (9) |
|
|
14:05 Anti-Keylogging with Noise |
|
|
46 | (20) |
|
|
|
66 | (8) |
|
|
|
|
74 | (15) |
|
|
14:08 Control Panel Vulnerabilities |
|
|
89 | (23) |
|
|
14:09 Hash Function Pseudo-Fixpoints |
|
|
112 | (10) |
|
|
14:10 A PDF That Shows Its Own MD5 |
|
|
122 | (8) |
|
|
14:11 A GIF shows its own MD5! |
|
|
130 | (8) |
|
|
|
138 | (9) |
|
|
|
I slipped a little, but Laphroaig was there |
|
|
147 | (238) |
|
15:02 Pier Solar and the Great Reverser |
|
|
152 | (22) |
|
|
15:03 The Alternator Sermon |
|
|
174 | (6) |
|
|
|
180 | (2) |
|
|
|
182 | (17) |
|
|
15:06 Cracking Gumball 4am |
|
|
199 | (93) |
|
|
15:07 A PDF that is a Git Repo |
|
|
292 | (16) |
|
|
15:08 Zero Overhead Networking |
|
|
308 | (24) |
|
|
15:09 Detecting MIPS16 Emulation |
|
|
332 | (12) |
|
|
|
15:10 Tracing Race Conditions |
|
|
344 | (10) |
|
|
|
15:11 x86 without Data Fetches |
|
|
354 | (5) |
|
|
15:12 Java Key Store's Coffin |
|
|
359 | (16) |
|
|
15:13 The PNG Gamma Trick |
|
|
375 | (10) |
|
|
Laphroaig Races the Runtime Relinker |
|
|
385 | (118) |
|
|
388 | (5) |
|
|
|
393 | (21) |
|
|
|
414 | (3) |
|
|
16:05 Uses for Useless Bugs |
|
|
417 | (7) |
|
|
|
424 | (32) |
|
|
16:07 Executing Unmapped Thumb |
|
|
456 | (12) |
|
|
16:08 Naming Network Interfaces |
|
|
468 | (5) |
|
|
16:09 Obfuscation via Symbolic Regression |
|
|
473 | (6) |
|
|
16:10 Stack Return Addresses from Canaries |
|
|
479 | (7) |
|
|
16:11 Rescuing Orphans in Thumb2 |
|
|
486 | (12) |
|
|
16:12 This PDF Reverse Engineers Itself |
|
|
498 | (5) |
|
|
It's damned cold outside, so let's light ourselves a fire! |
|
|
503 | (124) |
|
|
504 | (10) |
|
|
|
17:03 Tall Tales of Science and Fiction |
|
|
514 | (9) |
|
|
17:04 Sniffing BTLE with the Micro: Bit |
|
|
523 | (15) |
|
|
17:05 Bit-Banging Ethernet |
|
|
538 | (21) |
|
|
17:06 The DIP Flip Whixr Trick |
|
|
559 | (5) |
|
|
17:07 Injecting Shared Objects on FreeBSD |
|
|
564 | (20) |
|
|
17:08 Murder on the USS Table by Soldier Of Fortran |
|
|
584 | (36) |
|
|
620 | (7) |
|
|
Montessory Soldering School |
|
|
627 | (124) |
|
18:02 An 8 Kilobyte Mode 7 Demo |
|
|
628 | (16) |
|
|
18:03 Exploits for Kids with Scratch! |
|
|
644 | (13) |
|
|
18:04 Concealing ZIP Files in NES Cartridges |
|
|
657 | (10) |
|
|
|
667 | (30) |
|
|
18:06 Read Only Relocations for Static ELF |
|
|
697 | (20) |
|
|
18:07 Remotely Exploiting Tetrinet |
|
|
717 | (7) |
|
|
|
|
724 | (14) |
|
|
18:09 Reversing DDR3 Scrambling |
|
|
738 | (10) |
|
|
18:10 SHA-1 Collisions with PDFLaTeX |
|
|
748 | (3) |
|
Useful Tables |
|
751 | (34) |
Index |
|
785 | (9) |
Colophon |
|
794 | |