Intelligence is knowing what to do
when you don't know what to do
Technical Papers & Presentations
These white papers, technical papers and presentations have been given all over the world at
security conferences. We have collected them here to let you quickly examine Immunity's expertise.
Unveiling the Underground World of Anti-Cheats
Joel Noguera
Recon Montreal 2019
June 29th, 2019
Black Hat Europe 2019
December 5th, 2019
PDF - Recon
PDF - Black Hat
Kernel Memory Disclosures & CANVAS (Part 1, Part 2)
CANVAS Team
November 13th, 2018
PDF
#1
PDF #2
The Unbearable Lightness of BMC
Nico Waisman + Matias Soler
BlackHat USA 2018
August 8th, 2018
PDF
#1
PDF #2
CLOUDBURST Talk
Kostya Kortchinsky
May 26th, 2010
PDF
Vulnerability Assessment Tools vs. Penetration Testing Suites
Sean Heelan
Jan 6th, 2009
PDF
Code Analysis Carpentry
Sean Heelan
Dec 7th, 2010
PDF
Aleatory Persistent Threat
Nico Waisman
Dec 6th, 2010
PDF
Padding Oracle for the Masses
Nico Waisman
Dec 6th, 2010
PDF
DEPLIB 2.0
Pablo Sole
September 20th, 2010
PDF
Aleatory Persistent Threat
Nico Waisman
August 3rd, 2010
PDF
Applying Taint Analysis and Theorem Proving to Exploit Development
Sean Heelan
July 16th, 2010
PDF
Why Attackers Win
Dave Aitel
June 16th, 2010
ZIP
Confidence: General Notes About Exploiting Windows x64
Sebastian Fernandez
May 25th, 2010
PDF
PatchGuard
Gustavo Scotti
December 21st, 2009
PDF
Exploit Categories Explained
Alex McGeorge
November 30th, 2009
PDF
VAASeline
Rich Smith
BlackHat Europe 2009
April 16th, 2009
PDF
#1
PDF #2
CanSecWest Keynote: Writing User-Friendly Exploits
Skylar Rampersaud
CanSecWest 2009
March 19th, 2009
PDF
DEPLIB
Pablo Sole
November 8th, 2008
PDF
Economies of Scale in Hacking
Dave Aitel
October 4th, 2008
PDF
Corruption
Dave Aitel
September 25th, 2008
PDF
Attacking Embedded Languages
Pablo Sole
June 16th, 2008
ODP
Exploiting Kernel Pool Overflows
Kostya Kortchinsky
June 11th, 2008
ODP
The I2OMGMT Driver Impersonation Attack
Justin Seitz
June 11th, 2008
PDF
ODT
The Hacker Strategy*
Dave Aitel
* Updated for Harvard ABCD meeting
March 28th, 2008
PDF
IO Immunity Style
Sinan Eren
February 29th, 2008
PDF
The Hacker Strategy
Dave Aitel
S4 SCADA Conference Keynote
January 26th, 2008
PDF
Webmin: Perl Format String Bugs Case Study
Bas Alberts
November, 2005
PDF
The zlib infate_table bug: from patch to playtime
Bas Alberts
July, 2005
PDF
Exploiting the PHP_Limit bug
Bas Alberts
February 28th, 2005
PDF
Microsoft Windows, a lower Total Cost of Ownership
Dave Aitel
August 12th, 2004
PDF
SXW (Open Office)
Beyond Best Practices (Given at OWASP AppSec 2004)
Dave Aitel
June 21st, 2004
SXI (Open Office)
Rapid Application Development in Linux using pyGTK
Dave Aitel
May 19th, 2004
SXI (Open Office)
Windows Exploitation for Unix Hackers
May 1st, 2003
Power
Point
Linux Heap Overflow Techniques
Nicolas Waisman
March 1st, 2003
Power Point
Microsoft Heap Overflows I/II
September 12th, 2003
PDF
SXW
Microsoft Heap Overflows II/II
September 12th, 2003
PDF
SXW
®CANVAS, ®SILICA, ®Innuendo, ®El Jefe, ®Immunity, and ®Infiltrate are all registered trademarks of Immunity Inc.
© 2023 Immunity Inc. All rights reservedPrivacy Policy | Cookie Policy | Terms of Use