Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
Abuse of CPE Devices and Recommended Fixes Black Hat USA 2014
Dancing with Giants: Wimpy Kernels for On-demand Isolated I/O 35th IEEE Symposium on Security and Privacy
Bootstrapping Privacy Compliance in Big Data Systems 35th IEEE Symposium on Security and Privacy
Analyzing Forged SSL Certificates in the Wild 35th IEEE Symposium on Security and Privacy
All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API 35th IEEE Symposium on Security and Privacy
Buyer Beware: How to Be a Better Consumer of Security Maturity Models RSAC USA 2014
Effects of Recent Federal Policies on Security and Resiliency Landscapes RSAC USA 2014
Threat Modeling: How Do You Define It? How Do You Use It? RSAC USA 2014