Is the Tokenisation Framework Really Secure? |
RSAC Asia Pacific & Japan 2016
|
Owning SAP ASE: Chained Database Attack |
RSAC USA 2015
|
Reflected File Download - A New Web Attack Vector |
Black Hat Europe 2014
|
Same Origin Method Execution (SOME) - Exploiting a Callback for Same Origin Policy Bypass |
Black Hat Europe 2014
|
Bitcoin Transaction Malleability Theory in Practice |
Black Hat USA 2014
|
An Arms Race: Using Banking Trojan and Exploit Kit Tactics for Defense |
RSAC USA 2014
|
Touchlogger on iOS and Android |
RSAC USA 2014
|
Exploitation of Attackers' PHP Systems |
RSAC USA 2013
|