Conference talks

Below is a summary of the talks I have given at various security conferences and meet-ups.

To learn more about specific presentations, use the links to navigate to detailed subpages, which include abstracts, links to slide decks, video recordings (if available), references and other information.

In English

DateEventTitle
2024REconPeeling Back the Windows Registry Layers: A Bug Hunter’s Expedition
2024CONFidenceWindows Registry Deja Vu: The Return of Confused Deputies
2024OffensiveConPractical Exploitation of Registry Vulnerabilities in the Windows Kernel
2023Microsoft BlueHatExploring the Windows Registry as a powerful LPE attack surface
2018INFILTRATEBochspwn Revolutions: Further Advancements in Detecting Kernel Infoleaks with x86 Emulation
2017Black Hat USABochspwn Reloaded: Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking
2017REconBochspwn Reloaded: Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking
2016Black Hat EuropeEffective File Format Fuzzing – Thoughts, Techniques and Results
2016PacSecWindows Metafiles: An Analysis of the EMF Attack Surface & Recent Vulnerabilities
2016RuxconWindows Metafiles: An Analysis of the EMF Attack Surface & Recent Vulnerabilities
2016WarConEffective file format fuzzing – thoughts, techniques and results
201544CONReverse engineering and exploiting font rasterizers: the OpenType saga
2015REconOne font vulnerability to rule them all
2015Insomni'hackPwning (sometimes) with style – Dragons’ notes on CTFs
2014CONFidenceOn the battlefield with the Dragons – the interesting and surprising CTF challenges
2013ZeroNightsWindows Kernel Trap Handler and NTVDM Vulnerabilities – Case Study
2013Black Hat USABochspwn: Identifying 0-days via system-wide memory access pattern analysis
2013CONFidenceBeyond MOV ADD XOR – the unusual and unexpected in x86
2013NoSuchConAbusing the Windows Kernel: How to Crash an Operating System With Two Instructions
2013SyScanBochspwn: Exploiting Kernel Race Conditions Found via Memory Access Patterns
2012ZeroNightsWindows Kernel Reference Count Vulnerabilities – Case Study
2010CONFidenceCase study of recent Windows vulnerabilities

In Polish

DateEventTitle
2017Security PWNing ConferenceAutomatyczne wykrywanie błędów ujawnienia pamięci jądra w systemach Windows i Linux
2016Security PWNing ConferenceGraficzny format Windows Metafile: analiza wektorów ataku i najnowszych podatności
2015Sekurak Hacking PartyFakty, mity i przemyślenia na temat offensive security
2015PTIOffensive software security – fakty, mity i przemyślenia
2014SECUREUcieczka z Matrixa: (nie)bezpieczna analiza malware
2013SEConferenceBezpieczeństwo jądra Windows, lub jak zabić system dwiema instrukcjami
2010SecDayArchitektura procesora a exploitacja w systemie Windows
2010SEConferencePraktyczne spojrzenie na luki bezpieczeństwa jądra Windows
2009SecDayBootkit vs Windows