Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,220,486 papers from all fields of science
Search
Sign In
Create Free Account
Pwn2Own
Known as:
Dragos Ruiu
, Pwnium
Pwn2Own is a computer hacking contest held annually at the CanSecWest security conference, beginning in 2007. Contestants are challenged to exploit…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
32 relations
.NET Framework
Address space layout randomization
Adobe Flash
Android
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation
Xunchao Hu
,
Brian Testa
,
Heng Yin
Security and Privacy in Communication Networks
2019
Corpus ID: 209845470
JavaScript has been used to exploit binary vulnerabilities of host software that are otherwise difficult to exploit; they impose…
Expand
2016
2016
VTPin: practical VTable hijacking protection for binaries
Pawel Sarbinowski
,
V. Kemerlis
,
Cristiano Giuffrida
,
E. Athanasopoulos
Asia-Pacific Computer Systems Architecture…
2016
Corpus ID: 6175520
VTable hijacking has lately been promoted to the de facto technique for exploiting C++ applications, and in particular web…
Expand
2013
2013
Can viruses talk
P. Marks
2013
Corpus ID: 181634256
Marks talks about Dragos Ruiu's suspicion of an audio-based malware. The incredible claims made by Ruiu, a respected computer…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE