Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
Well that Escalated Quickly! How Abusing Docker API Led to Remote Code Execution Same Origin Bypass and Persistence in the Hypervisor via Shadow Containers Black Hat USA 2017
Watching the Watchdog: Protecting Kerberos Authentication with Network Monitoring Black Hat Europe 2015
Digital 'Bian Lian' (face changing): the skeleton key malware VB2015 Prague
Why Does Database Patching Require A PhD? RSAC  Europe 2013