Nytro Posted January 19, 2015 Report Posted January 19, 2015 UaF: Mitigation and BypassJared DeMott, Security ResearcherBromium LabsMotivation• Interest in the state of memory corruption exploits• Past work includes bypassing EMET• Wanted to examine? Internet Explorers new Use-after-Free (UaF) protections? Learn how effective they are? How do these protections compare to EMET?• They don’t? We’ll see a chart that shows the relative position of different protectionsDownload: https://bromiumlabs.files.wordpress.com/2015/01/demott_uaf_migitation_and_bypass.pdf Quote