Breaking Kernel Address Space Layout Randomization (KASLR) With Intel TSX

42:56
Using Undocumented CPU Behavior to See Into Kernel Mode and Break KASLR in the Process

53:49
Bochspwn Reloaded: Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking

38:21
Breaking FIDO: Are Exploits in There?

43:19
DEF CON 24 - Ulf Frisk - Direct Memory Attack the Kernel

44:29
Breaking the x86 Instruction Set

46:34
The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

49:18
Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges

52:29