Bypassing Memory Mitigations Using Data-Only Exploitation Techniques (Part II) |
HITBSecConf2017 – Amsterdam
|
The Power of Data-Oriented Attacks: Bypassing Memory Mitigation Using Data-Only Exploitation Techniques |
Black Hat Asia 2017
|
Sweating the Small Stuff on a Global Scale |
RSAC USA 2017
|
Threat Modeling the Trenches to the Clouds |
RSAC USA 2017
|
Analysis of the Attack Surface of Microsoft Office from User's Perspective |
BlueHat v16
|
Diving into Pinkslipbot's Latest Campaign |
VB2016 Denver
|
Wild Android Collusions |
VB2016 Denver
|
Maximize the Value of Your Threat Intelligence |
RSAC Asia Pacific & Japan 2016
|
Economic sanctions on malware |
VB2015 Prague
|
Last-minute paper: We know what you did this summer: Android banking trojan exposing its sins in the cloud |
VB2015 Prague
|