Inside Android's SafetyNet Attestation |
Black Hat Europe 2017
|
Breaking Payloads with Runtime Code Stripping and Image Freezing |
Black Hat USA 2015
|
Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces |
Black Hat USA 2014
|
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces |
35th IEEE Symposium on Security and Privacy
|
Read It Twice! A Mass-Storage-Based TOCTTOU Attack |
WOOT '12
|
Detecting Reverse Engineering with Canaries |
CanSecWest 2018
|
The Real Deal of Android Device Security: the Third Party |
CanSecWest 2014
|
SMS-o-Death: From Analyzing To Attacking Mobile Phones on a Large Scale |
CanSecWest 2011
|