Can We Prevent Use-after-free Attacks? Why is Security Management So Hard? HTTPプロクシライブラリproxy2の設計と実装 Self Introduction & The Story that I Tried to Make Sayonara ROP Chain in Linux Abusing Interrupts for Reliable Windows Kernel Exploitation (en) Abusing Interrupts for Reliable Windows Kernel Exploitation (ja) proxy2: HTTPS pins and needles ROP Illmatic: Exploring Universal ROP on glibc x86-64 (ja) How to apt-get from the internal network: remote sshd with kneesocks CRYPT+YOU, UNDERSTAND TODAY! Making a Proxy for Fun and Profit Sniffing BitTorrent DHT ~人はBTで何を落とすのか~