Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,376,792 papers from all fields of science
Search
Sign In
Create Free Account
Pwn2Own
Known as:
Dragos Ruiu
, Pwnium
Pwn2Own is a computer hacking contest held annually at the CanSecWest security conference, beginning in 2007. Contestants are challenged to exploit…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
32 relations
.NET Framework
Address space layout randomization
Adobe Flash
Android
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation
Xunchao Hu
,
Brian Testa
,
Heng Yin
Security and Privacy in Communication Networks
2019
Corpus ID: 209845470
JavaScript has been used to exploit binary vulnerabilities of host software that are otherwise difficult to exploit; they impose…
Expand
2017
2017
DETECTION, DIAGNOSIS AND MITIGATION OF MALICIOUS JAVASCRIPT WITH ENRICHED JAVASCRIPT EXECUTIONS
Xunchao Hu
2017
Corpus ID: 69694415
Malicious JavaScript has become an important attack vector for software exploitation attacks and imposes a severe threat to…
Expand
2016
2016
VTPin: practical VTable hijacking protection for binaries
Pawel Sarbinowski
,
V. Kemerlis
,
Cristiano Giuffrida
,
E. Athanasopoulos
Asia-Pacific Computer Systems Architecture…
2016
Corpus ID: 6175520
VTable hijacking has lately been promoted to the de facto technique for exploiting C++ applications, and in particular web…
Expand
2015
2015
Return to Where? You Can't Exploit What You Can't Find
Stephen Crane
,
C. Liebchen
,
+5 authors
M. Franz
2015
Corpus ID: 2080046
Detecting and preventing exploitation of memory corruption vulnerabilities is highly challenging. Until now, no countermeasure…
Expand
2014
2014
Cryptographically Enforced Control Flow Integrity
A. Mashtizadeh
,
Andrea Bittau
,
David Mazières
,
D. Boneh
arXiv.org
2014
Corpus ID: 18245757
Recent Pwn2Own competitions have demonstrated the continued effectiveness of control hijacking attacks despite deployed…
Expand
2013
2013
Can viruses talk
P. Marks
2013
Corpus ID: 181634256
Marks talks about Dragos Ruiu's suspicion of an audio-based malware. The incredible claims made by Ruiu, a respected computer…
Expand
Highly Cited
2010
Highly Cited
2010
Organizing Large Scale Hacking Competitions
Nicholas Childers
,
B. Boe
,
+4 authors
Giovanni Vigna
International Conference on Detection of…
2010
Corpus ID: 125273
Computer security competitions and challenges are a way to foster innovation and educate students in a highly-motivating setting…
Expand
2010
2010
Pwn2Own wrap up and analysis
A. Portnoy
Network Security
2010
Corpus ID: 46652873
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE