Time travel debugging: It’s a blast! (from the past)

Original Post from Microsoft Security Research & Defense Author: swiat The Microsoft Security Response Center (MSRC)…

Vulnerability hunting with Semmle QL, part 2

Original Post from Microsoft Security Research & Defense Author: swiat The first part of this series…

Local privilege escalation via the Windows I/O Manager: a variant finding collaboration

Original Post from Microsoft Security Research & Defense Author: swiat The Microsoft Security Response Center (MSRC)…

Fuzzing para-virtualized devices in Hyper-V

Original Post from Microsoft Security Research & Defense Author: swiat Introduction Hyper-V is the backbone of…

First Steps in Hyper-V Research

Original Post from Microsoft Security Research & Defense Author: swiat Microsoft has put a lot of…

Microsoft Security Servicing Criteria for Windows

Original Post from Microsoft Security Research & Defense Author: swiat One of our goals in the…

Vulnerability hunting with Semmle QL, part 1

Original Post from Microsoft Security Research & Defense Author: swiat Previously on this blog, we’ve talked…

WordPress Appliance - Powered by TurnKey Linux