AI Accelerated Exploiting: Compromising MTE Enabled Pixel from DSP Coprocessor by PAN Zhenpeng & Billy JHENG Bing Jhong
Dancing with Exynos Coprocessor: Pwning Samsung for fun and “profit” by Muhammad Ramdhan, PAN Zhenpeng & Billy JHENG Bing Jhong
Cracking the Pixel 8: Exploiting the Undocumented DSP to Bypass MTE by PAN Zhenpeng & Billy JHENG Bing Jhong
VMware Workstation: Escaping via a New Route - Virtual Bluetooth by NGUYỄN Hoàng Thạch
GPUAF : Two ways of rooting All Qualcomm based Android phones by PAN Zhenpeng & Billy JHENG Bing Jhong
A Year Fuzzing XNU Mach IPC by Peter NGUYỄN Vũ Hoàng
Ghosts of the Past: Classic PHP RCE Bugs in Trend Micro Enterprise Offerings by POH Jia Hao
What You See IS NOT What You Get: Pwning Electron-based Markdown Note-taking Apps by LI Jiantao
Unearthing Vulnerabilities in the Apple Ecosystem The Art of KidFuzzerV2.0 by PAN Zhenpeng
How to Backup and Pwn using Time Machine by NGUYỄN Hoàng Thạch
The Journey To Hybrid Apple Driver Fuzzing by PAN Zhenpeng
All Roads leads to GKE’s Host : 4+ Ways to Escape by Billy JHENG Bing-Jhong & Muhammad Ramdhan
A journey of hunting macOS kernel vulnerability by Peter NGUYỄN Vũ Hoàng
An Introduction to Manual Source Code Review by POH Jia Hao
A case study of an incorrect bitwise and optimization in V8 by Lucas TAY
VM Escape Case Study VirtualBox Bug Hunting and Exploitation by Muhammad Ramdhan
The Great Escape - A Case Study of VM Escape and EoP Vulnerabilities by Billy JHENG Bing-Jhong & Muhammad Ramdhan