Julian Horoszkiewicz

Julian Horoszkiewicz

@ewilded · Twitter ·

Finally, it is published 😁 Making Vulnerable Drivers Exploitable Without Hardware - my latest research on driver vulnerability hardware-gating, explaining the concept of hardware-dependent code and diving deep into creative deployment techniques - software-emulated phantom devices, driver restacking, and forced driver replacement — all explored through the lens of Bring Your Own Vulnerable Driver (BYOVD) attacks: https://atos.net/wp-content/uploads/2026/04/atos-byovd-article.pdf