You’re off the hook: blinding security software |
Zeronights Moscow 2016
|
DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes |
Black Hat USA 2016
|
Horse Pill: A New Type of Linux Rootkit |
Black Hat USA 2016
|
Break Out of the Truman Show: Active Detection and Escape of Dynamic Binary Instrumentation |
Black Hat Asia 2016
|
NumChecker: A System Approach for Kernel Rootkit Detection and Identification |
Black Hat Asia 2016
|
Fuzzing Android: A Recipe for Uncovering Vulnerabilities Inside System Components in Android |
Black Hat Europe 2015
|
Symbolic Execution for BIOS Security |
WOOT '15
|
Hijacking Arbitrary .NET Application Control Flow |
DEF CON 23
|
Attacking Hypervisors Using Firmware and Hardware |
Black Hat USA 2015
|
Distributing the Reconstruction of High-Level Intermediate Representation for Large Scale Malware Analysis |
Black Hat USA 2015
|