Redesigning the Edge with Just-In-Time Network Access
|
Jon DeHart
,
Microsoft Corporation
|
How to Avoid Implement An Exploit Friendly JIT
|
|
Ransomware Threat Landscape and Retrospect
|
|
Win32k Security Improvements: Past & Present
|
|
Analysis of the Attack Surface of Microsoft Office from User's Perspective
|
|
Detecting Malicious Masquerading Processes
|
John Booth
,
Microsoft Corporation
|
Fuzzing Cloud "Project Springfield"
|
David Molnar
,
Microsoft Corporation
|
Trusted Things That Execute
|
|
Security of Open Source at Microsoft
|
Michael Scovetta
,
Jan Vandenbos
,
Microsoft Corporation
|
Invoke-Obfuscation: Powershell obFUsk8tion Techniques & How To (Try To) D""e'Tec'T 'Th'+'em'
|
|
Visiting the Bear Den
|
Jessy Campos
,
ESET
|
Breaking Things Early: Designing Secure Containers
|
Saruhan Karademir
,
Microsoft Corporation
|
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
|
Peter Hlavaty
,
Tencent, Inc.
|
Analysis of the Attack Surface of Microsoft Office from User's Perspective
|
Haifei Li
,
Intel Security
|
Breaking Things Early: Designing Secure Containers
|
|
Fuzzing Cloud "Project Springfield"
|
|
Windows Credential Protections: Where are we now?
|
Michiko Short
,
Microsoft Corporation
|
Redesigning the Edge with Just-In-Time Network Access
|
|
What is Threat Intelligence?
|
Stirling McBride
,
Daniel Edwards
,
Microsoft Corporation
|
I Got a Letter From the Government the Other Day... Unveiling a Campaign of Intimidation, Kidnapping, and Malware in Kazakhstan
|
Cooper Quintin
,
Electronic Frontier Foundation
|
Trusted Things That Execute
|
Casey Smith
,
Veris Group ATD
|
In-memory compromise detection as an Azure service
|
Pete Loveless
,
Fred Aaron
,
Microsoft Corporation
|
Gaining Visibility into Linux Binaries on Windows - How to defend and understand WSL
|
|
In-memory compromise detection as an Azure service
|
|
Windows Credential Protections: Where are we now?
|
|
The Security Monty Python and the Holy Grail
|
|
Harnessing Intel Processor Trace on Windows for Vulnerability Discovery
|
|
Windows Subsystem for Linux (WSL)
|
Stephen Hufnagel
,
Sven Groot
,
Microsoft Corporation
|
Gaining Visibility into Linux Binaries on Windows - How to defend and understand WSL
|
Alex Ionescu
,
Crowdstrike
|
Windows Subsystem for Linux (WSL)
|
|
I Got a Letter From the Government the Other Day... Unveiling a Campaign of Intimidation, Kidnapping, and Malware in Kazakhstan
|
|
Detecting Malicious Masquerading Processes
|
|
Visiting the Bear Den
|
|
Security of Open Source at Microsoft
|
|
A Year of Hardening Adobe Flash Player
|
David Weston
,
Matt Miller
,
Peleus Uhley
,
Microsoft Corporation
,
Adobe Systems, Inc.
|
Identity Protection at scale - A Year in the Trenches with Microsoft Identity Protection team
|
|
Identity Protection at scale - A Year in the Trenches with Microsoft Identity Protection team
|
Alex Weinert
,
Dana Kaufman
,
Microsoft Corporation
|
Win32k Security Improvements: Past & Present
|
Genghis Karimov
,
Microsoft Corporation
|
What is Threat Intelligence?
|
|
How to Avoid Implement An Exploit Friendly JIT
|
Yunhai Zhang
,
NSFOCUS
|
A Year of Hardening Adobe Flash Player
|
|
Hypervisors in Your Toolbox: Monitoring and Controlling System Events with HyperPlatform
|
|
Ransomware Threat Landscape and Retrospect
|
Marianne Malle
,
Patrick Estavillo
,
Microsoft Corporation
|
Hypervisors in Your Toolbox: Monitoring and Controlling System Events with HyperPlatform
|
Satoshi Tanda
,
Crowdstrike
|
Harnessing Intel Processor Trace on Windows for Vulnerability Discovery
|
Andrea Allievi
,
Richard Johnson
,
Microsoft Corporation
,
Cisco Systems
|
You didnt see it??s coming? "Dawn of hardened Windows Kernel"
|
|
Invoke-Obfuscation: Powershell obFUsk8tion Techniques & How To (Try To) D""e'Tec'T 'Th'+'em'
|
Daniel Bohannon
,
Mandiant
|
The Security Monty Python and the Holy Grail
|
David Kennedy
,
Binary Defense Systems
,
TrustedSec
|