DC to DEF CON: Q&A; with Congressmen James Langevin and Will Hurd |
DEF CON 25
|
Firmware is the New Black - Analyzing Past Three Years of BIOS/UEFI Security Vulnerabilities |
Black Hat USA 2017
|
Taking DMA Attacks to the Next Level: How to do Arbitrary Memory Reads/Writes in a Live and Unmodified System Using a Rogue Memory Controller |
Black Hat USA 2017
|
HITB Lab: Practical Machine Learning in InfoSecurity |
HITBSecConf2017 – Amsterdam
|
Bypassing Memory Mitigations Using Data-Only Exploitation Techniques (Part II) |
HITBSecConf2017 – Amsterdam
|
Cybersecurity Challenges and Innovative Hardware Solutions from Intel |
RSAC USA 2017
|
Look, C-Suite, No Hands! Communicating the Top 10 Privacy and Security Topics |
RSAC USA 2017
|
Open Security Controller: Security Orchestration for OpenStack |
RSAC USA 2017
|
DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes |
Zeronights Moscow 2016
|
I know where your page lives: Derandomizing the latest Windows 10 Kernel |
Zeronights Moscow 2016
|