This session will discuss some protections added by the operating systems and processors to mitigate the exploitation, after that, also present some ways to bypass those protections.