Are you a software ninja? Want to influence the next generation of cybersecurity? Come join us!

CFI1 has most certainly set the standard for exploit mitigations, and has inspired many implementations such Microsoft CFG2, Microsoft RFG3, PaX Team’s RAP™4 and Clang’s CFI5. In this series of posts we’re going to demonstrate how modern CFI implementations can be circumvented. Specifically in this post we’ll be

What will you do exactly?

CFI1 has most certainly set the standard for exploit mitigations, and has inspired many implementations such Microsoft CFG2, Microsoft RFG3, PaX Team’s RAP™4 and Clang’s CFI5. In this series of posts we’re going to demonstrate how modern CFI implementations can be circumvented. Specifically in this post we’ll be

What skills do you have?

CFI1 has most certainly set the standard for exploit mitigations, and has inspired many implementations such Microsoft CFG2, Microsoft RFG3, PaX Team’s RAP™4 and Clang’s CFI5. In this series of posts we’re going to demonstrate how modern CFI implementations can be circumvented. Specifically in this post we’ll be

Why work at Perception Point?

CFI1 has most certainly set the standard for exploit mitigations, and has inspired many implementations such Microsoft CFG2, Microsoft RFG3, PaX Team’s RAP™4 and Clang’s CFI5. In this series of posts we’re going to demonstrate how modern CFI implementations can be circumvented. Specifically in this post we’ll be

Who are we?

CFI1 has most certainly set the standard for exploit mitigations, and has inspired many implementations such Microsoft CFG2, Microsoft RFG3, PaX Team’s RAP™4 and Clang’s CFI5. In this series of posts we’re going to demonstrate how modern CFI implementations can be circumvented. Specifically in this post we’ll be

Apply now.

Relevent Links (Linkedin / Stack Overflow / Github etc.)