- qwn2own - BKPCTF 2016
- Feuerfuchs - 33c3CTF 2016
- SGX_Browser - HITB 2017
- Chakrazy - PlaidCTF 2017
- v9 - 34c3 2017
- Blazefox - BlazeCTF 2018
- Just in time - GoogleCTF finals 2018
- Mr. Mojo Rising - GoogleCTF finals 2018
- ES1337 - CSAW 2018
- Roll a d8 - PlaidCTF 2018
- funfox - 35c3CTF 2018
- webkid - 35c3CTF 2018
- krautflare - 35c3CTF 2018
- Attacking Client Side JIT compilers
- Attacking Chrome IPC
- Layman's guide to zero day engineering
- From Zero to zero day
- Logically Bypassing Browser Security Boundaries
- http://www.phrack.org/papers/attacking_javascript_engines.html
- https://bruce30262.github.io/Learning-browser-exploitation-via-33C3-CTF-feuerfuchs-challenge/
- https://phoenhex.re/2017-06-21/firefox-structuredclone-refleak
- https://googleprojectzero.blogspot.com/2018/10/365-days-later-finding-and-exploiting.html
- https://blog.ret2.io/2018/08/28/pwn2own-2018-sandbox-escape/
- https://labs.mwrinfosecurity.com/assets/BlogFiles/apple-safari-pwn2own-vuln-write-up-2018-10-29-final.pdf
- http://www.phrack.org/issues/69/14.html
- https://www.jaybosamiya.com/blog/2019/01/02/krautflare/