Publications

Publication

Bug hunting with static code analysis

Nick Jones presented "Bug hunting with static code analysis" at BSides London 2016. 

+ read more

Publication

Windows Kernel Exploitation 101: Exploiting CVE-2014-4113

The walkthrough aims to guide the reader through creating code to trigger and exploit CVE-2014-4113. It does this by starting from an Anti-Virus vendor report highlighting when the vulnerability was originally discovered being exploited in the wild.

+ read more

Whitepaper

LoRa Security: Building a secure LoRa solution

Robert Miller presented "LoRa the Explorer - Attacking and Defending LoRa Systems" at Syscan360.This whitepaper provides implementers and developers with an overview of the security features of LoRaWAN, a developer's responsibilities in make a solution secure...

+ read more

Slides

QNX: 99 Problems but a Microkernel ain't one!

Alex Plaskett and Georgi Geshev presented "99 Problems but a Microkernel ain't one!" at BSides NYC and TROOPERS16.

+ read more

Whitepaper

QNX: Security Architecture Whitepaper

Alex Plaskett and Georgi Geshev presented "99 Problems but a Microkernel ain't one!" at BSides NYC and TROOPERS16.

+ read more

Slides

The Pageantry of Lateral Movement

Stuart Morgan presented 'The Pageantry of Lateral Movement' at BSides NYC. 

+ read more

Slides

Warranty Void If Label Removed: Attacking MPLS Networks

Georgi Geshev presented “Warranty Void If Label Removed: Attacking MPLS Networks” at multiple security conferences including ekoparty in Argentina, PacSec in Japan, and ZeroNights in Russia.

+ read more

Slides

Journey Into Hunting The Attackers

Asif Matadar presented “Journey Into Hunting The Attackers” on the rookie track at the BSides Manchester 2015 security conference.

+ read more

Slides

Mission mPOSsible

Mobile Point-of-Sale (mPOS) devices represent the next step in bringing the processing of card payments to individuals and small businesses.

+ read more

Whitepaper

Understanding the Protected-View Sandbox

Yong Chuan Koh presented “Understanding the Microsoft Office 2013 Protected-View Sandbox” at the REcon 2015 Security Conference.

+ read more

Slides

Why Bother Assessing Popular Software?

David Middlehurst and James Loureiro presented at BSides London 2015 on assessing popular software. In their talk they started by setting the scene with the current state of software security and what you might expect from...

+ read more

Slides

Watch You Lookin' At?

MWR’s Jahmel Harris and Owen Evans presented their research into wearables running on the Android Wear platform at Securi-Tay 2015.

+ read more