No Free Charge Theorem 2.0: How to Steal Private Information from a Mobile Device Using a Powerbank |
Black Hat Europe 2018
|
Back To The Epilogue: How to Evade Windows' Control Flow Guard with Less than 16 Bytes |
Black Hat Asia 2018
|
Skype & Type: Keystroke Leakage over VoIP |
Black Hat USA 2017
|