Through the Eyes of the Attacker: Designing Embedded Systems Exploits for Industrial Control Systems |
DEF CON 26
|
Analyzing & Breaking Exploit Mitigations and PRNGs on QNX for Automotive, Industrial, Medical and other Embedded Systems |
Black Hat Asia 2018
|
Dissecting QNX - Analyzing & Breaking QNX Exploit Mitigations and Secure Random Number Generators |
OffensiveCon 2018
|
Dissecting QNX |
RECON BRUSSELS 2018
|
APTs Way: Evading Your EBNIDS |
Black Hat Europe 2014
|
Dissecting QNX - Analyzing & Breaking QNX Exploit Mitigations and Secure Random Number Generators |
INFILTRATE 2018
|