Exploiting Trusted Apps on Samsung’s TEE
Technical whitepapers about research projects conducted by Blue Frost Security.
Windows 10 kernel exploitation techniques based on the latest Windows 10 RS3 insider preview
A Browser Exploitation Case Study for Internet Explorer 11
Analysis of the Windows kernel vulnerability CVE-2014-4113, demonstrating how it can successfully be exploited on Windows 8.1.