Well that Escalated Quickly! How Abusing Docker API Led to Remote Code Execution Same Origin Bypass and Persistence in the Hypervisor via Shadow Containers |
Black Hat USA 2017
|
Watching the Watchdog: Protecting Kerberos Authentication with Network Monitoring |
Black Hat Europe 2015
|
Digital 'Bian Lian' (face changing): the skeleton key malware |
VB2015 Prague
|
Why Does Database Patching Require A PhD? |
RSAC Europe 2013
|