Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
Bypassing Memory Mitigations Using Data-Only Exploitation Techniques (Part II) HITBSecConf2017 – Amsterdam
The Power of Data-Oriented Attacks: Bypassing Memory Mitigation Using Data-Only Exploitation Techniques Black Hat Asia 2017
Sweating the Small Stuff on a Global Scale RSAC USA 2017
Threat Modeling the Trenches to the Clouds RSAC USA 2017
Analysis of the Attack Surface of Microsoft Office from User's Perspective BlueHat v16
Diving into Pinkslipbot's Latest Campaign VB2016 Denver
Wild Android Collusions VB2016 Denver
Maximize the Value of Your Threat Intelligence RSAC Asia Pacific & Japan 2016
Economic sanctions on malware VB2015 Prague
Last-minute paper: We know what you did this summer: Android banking trojan exposing its sins in the cloud VB2015 Prague