Abusing Performance Optimization Weaknesses to Bypass ASLR

Publication
Black Hat USA Briefings 2014