The IoT Hacker's Toolkit |
BSidesSF2018
|
Defense-in-Depth Techniques for Modern Web Applications and Google’s Journey with CSP |
HITBSecConf2018 – Amsterdam
|
A Link Between Sandboxes |
2018 SyScan360 Singapore
|
The Smarts Behind Hacking Dumb Devices |
OffensiveCon 2018
|
"Machine learning, offense, and the future of automation" |
Zeronights Moscow 2017
|
10 Years of Targeted Credential Phishing |
BlueHat v17
|
Data breaches, phishing, or malware? Understanding the risks of stolen credentials |
ACM CCS 2017
|
Practical Secure Aggregation for Privacy-Preserving Machine Learning |
ACM CCS 2017
|
How we created the first SHA-1 collision and what it means for hash security |
DEF CON 25
|
Attacking Encrypted USB Keys the Hard(ware) Way |
Black Hat USA 2017
|