SELECT code_execution FROM * USING SQLite: Eggheads lift the lid on DB security hi-jinks

You’ve heard of ROP? Now get a load of QOP DEF CON  At the DEF CON hacking conference in Las Vegas on Saturday, infosec gurus from Check Point are scheduled to describe a technique for exploiting SQLite, a database used in applications across every major desktop and mobile operating system,… read more →