A Modern History of Offensive Security Research
Dino Dai Zovi�Staff Security Engineer�Square, Inc.
My offensive security research journey
0 - 1997: We Could Be Happy Underground
7 Years
How long that the technique of buffer overflow exploitation was “lost”
1997 - 2007: Hacking gets down to business
Advanced Buffer Overflow Technique (Hoglund, 2000)
Third Generation Exploitation (Flake, 2002)
Remote Windows Kernel Exploitation (Jack, 2005)
Heap Feng Shui in JavaScript (Sotirov, 2007)
Application-Specific Attacks: Leveraging the ActionScript Virtual Machine (Dowd, 2008)
2007-2017: Offensive Research Gets Real
Bug Bounties Become the Norm
PWN2OWN Becomes a Team Sport
2017 - ∞