Abuse of CPE Devices and Recommended Fixes |
Black Hat USA 2014
|
Dancing with Giants: Wimpy Kernels for On-demand Isolated I/O |
35th IEEE Symposium on Security and Privacy
|
Bootstrapping Privacy Compliance in Big Data Systems |
35th IEEE Symposium on Security and Privacy
|
Analyzing Forged SSL Certificates in the Wild |
35th IEEE Symposium on Security and Privacy
|
All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API |
35th IEEE Symposium on Security and Privacy
|
Buyer Beware: How to Be a Better Consumer of Security Maturity Models |
RSAC USA 2014
|
Effects of Recent Federal Policies on Security and Resiliency Landscapes |
RSAC USA 2014
|
Threat Modeling: How Do You Define It? How Do You Use It? |
RSAC USA 2014
|