DC to DEF CON: Q&A; with Congressmen James Langevin and Will Hurd |
DEF CON 25
|
(Un)Fucking Forensics: Active/Passive (i.e. Offensive/Defensive) memory hacking/debugging. |
DEF CON 25
|
Go Nuclear: Breaking Radiation Monitoring Devices |
Black Hat USA 2017
|
Taking Over the World Through MQTT - Aftermath |
Black Hat USA 2017
|
How to Fool an ADC Part II or Hiding Destruction of Turbine with a Little Help of Signal Processing |
Black Hat Europe 2016
|
A Rising Tide: Design Exploits in Industrial Control Systems |
WOOT '16
|
Blockfighting with a Hooker -- BlockfFghter2! |
DEF CON 24
|
Never Trust Your Inputs: Causing 'Catastrophic Physical Consequences' from the Sensor (or How to Fool ADC) |
Black Hat Asia 2016
|
Hacking Critical Infrastructure Like You’re Not a N00b |
RSAC USA 2016
|
Abusing XSLT for Practical Attacks |
DEF CON 23
|