F13 Laboratory

The F13 Laboratory security research group conducts research covers all aspects of security and privacy, including software securiy, system security and privacy. Our research mainly targeted on reverse code engineering, driver development, exploit code research and malware code research.

 

Research and Solutions

Use After free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code in the context of the current user...

Microsoft Office is proned to a remote memory corruption vulnerability when open a crafted WordPerfect document(.wpd) file.

The CVE-2013-3891 vulnerability exist in Microsoft Office 2003 Service Pack 3 and older version is prone to a remote memory curruption vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the currently logged-in user...

The Font Program (FPGM) is used to define function and instruction definitions. This table is similar to the CVT table, except it is only run once, when the font is first used...

The FontFuzzer is created to fuzz the TrueType Font(TTF) into different sizes which enables the generation of test cases...