CommSec: Solving The Last Mile Problem Between Machine Learning and Security Operations |
HITBSecConf2018 – Beijing
|
VSPMiner: Detecting Security Hazards in SEAndroid Vendor Customizations via Large-Scale Supervised Machine Learning |
Black Hat Asia 2018
|
macOS/iOS Kernel Debugging and Heap Feng Shui |
DEF CON 25
|
DC to DEF CON: Q&A; with Congressmen James Langevin and Will Hurd |
DEF CON 25
|
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis |
37th IEEE Symposium on Security and Privacy
|
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound |
ACM CCS 2014
|