How we created the first SHA-1 collision and what it means for hash security |
DEF CON 25
|
Attacking Encrypted USB Keys the Hard(ware) Way |
Black Hat USA 2017
|
How We Created the First SHA-1 Collision and What it Means for Hash Security |
Black Hat USA 2017
|
Tracking Ransomware End to End |
Black Hat USA 2017
|
Does Dropping USB Drives in Parking Lots and Other Places Really Work? |
Black Hat USA 2016
|
Dialing Back Abuse on Phone Veri?ed Accounts |
ACM CCS 2014
|
The End is Nigh: Generic Solving of Text-based CAPTCHAs |
WOOT '14
|
I am a legend: Hacking Hearthstone with machine learning |
DEF CON 22
|
The Art of Breaking and Designing CAPTCHAS |
RSAC USA 2012
|