Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
TeLeScope: Peering Into the Depths of TLS Traffic in Real-Time HITBSecConf2016 – Amsterdam
Hiding the network behind the network. Botnet proxy business model VB2014 Seattle
Can we trust a trustee? An in-depth look into the digitally signed malware industry VB2014 Seattle
Labelling spam through the analysis of protocol patterns VB2014 Seattle
It has a EULA, it must be legit VB2014 Seattle
Google and Apple markets: are their applications really secure?! VB2013 Berlin
Digging into Facebook ads: finding clues that indicate a scam pattern VB2013 Berlin
The ransomware strikes back VB2013 Berlin