Fillory of PHY: Toward a Periodic Table of Signal Corruption Exploits and Polyglots in Digital Radio |
WOOT '16
|
Intra-Process Memory Protection for Applications on ARM and x86: Leveraging the ELF ABI |
Black Hat USA 2016
|
The Promise and the Perils of Wearables |
RSAC USA 2015
|
ZEBRA: Zero-Effort Bilateral Recurring Authentication |
35th IEEE Symposium on Security and Privacy
|
The Page-Fault Weird Machine: Lessons in Instruction-less Computation |
WOOT '13
|
“Weird Machines” in ELF: A Spotlight on the Underappreciated Metadata |
WOOT '13
|