filmov
tv
Revisiting JavaScriptCore Internals: boxed vs. unboxed
Показать описание
Part 6: There are still many things I haven't explained yet. So in this video we go over the boxed vs. unboxed values, how to convert Integer addresses to Doubles and why our bug is a memory corruption.
-=[ 🕴️Advertisement ]=-
-=[ 🔴 Stuff I use ]=-
-=[ ❤️ Support ]=-
-=[ 🐕 Social ]=-
-=[ 📄 P.S. ]=-
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
-=[ 🕴️Advertisement ]=-
-=[ 🔴 Stuff I use ]=-
-=[ ❤️ Support ]=-
-=[ 🐕 Social ]=-
-=[ 📄 P.S. ]=-
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Revisiting JavaScriptCore Internals: boxed vs. unboxed
Just-in-time Compiler in JavaScriptCore (WebKit)
OffensiveCon22 - Samuel Gross and Amanda Burnett - Attacking JavaScript Engines in 2022
WebKit RegExp Exploit addrof() walk-through
Michael Saboff — JavaScriptCore, many compilers make this engine perform
!!Con West 2019 - Annie Cherkaev: The secret life of Not-a-Number!
HTML : javascript/gwt: converting Uint8Array or ArrayBuffer to ImageData element
Exploiting CSP in WebKit to Break Authentication and Authorization
OffensiveCon20 - Ki Chan Ahn - Adventures on Hunting for Safari Sandbox Escapes
#HITBGSEC 2018 D1: Turning Memory Errors Into Code Execution With Client-Side Compilers - R. Gawlik
NodeJS : Using MusicKit JS from Nodejs
Rethinking Cross-Platform Development - The Best of Both Worlds
Preparing for Stage 2 of a WebKit exploit
Array : Uint8Array Javascript usecase
Immutability: Putting The Dream Machine To Work • David Nolen • GOTO 2014
WebKit Everywhere: Secure or Not?
MurmusCTF, SSD CTF Challenge, Google CTF writeups - PwnNews 27/06/19
#HITB2017AMS D1T2 - The Secret Of Chakracore: 10 Ways To Go Beyond The Edge - Linan Hao and Long Liu
Black Hat USA 2017 Breaking XSS Mitigations Via Script Gadgets
cljs.main - David Nolen
Parasitic Programming Languages - David Nolen
OffensiveCon19 - Niklas Baumstark - IPC You Outside the Sandbox: One bug to Rule the Chrome Broker
Mobile Espionage in the Wild: Pegasus and Nation-State Level Attacks
Dalvik (software) | Wikipedia audio article
Комментарии