The State of Return Oriented Programming in Contemporary Exploits Threat Research March 3, 2014 6 min read
Mitigating the Exploitation of Vulnerabilities that Allow Diverting Kernel Execution Flow in Windows Security Intelligence & Analytics December 13, 2013 4 min read
Virtual Machines and How Malware Authors Know When They Are Being Watched Malware October 16, 2013 7 min read
You Are Being Watched! Ways Malware Authors Are Fighting to Maintain FUD Status Advanced Threats October 7, 2013 4 min read