Implementing the U.S. Cybersecurity Framework at Intel—A Case Study |
RSAC USA 2015
|
New Trends In Cryptographic Algorithm Suites Used for TLS Communications |
RSAC USA 2015
|
Using the Cybersecurity Framework: Lessons Learned and Opportunities |
RSAC USA 2015
|
We're Gonna Need a Bigger Boat |
RSAC USA 2015
|
Android Kernel and OS Security Assessment with Iron Crow |
Black Hat Europe 2014
|
Bootkits: past, present & future |
VB2014 Seattle
|
Creating a Spider Goat: Using Transactional Memory Support for Security |
Black Hat USA 2014
|
Prevalent Characteristics in Modern Malware |
Black Hat USA 2014
|
Privacy-by-Design for the Security Practitioner |
Black Hat Asia 2014
|
Building and Extending Solutions with Hardware Trust |
RSAC USA 2014
|