TeLeScope: Peering Into the Depths of TLS Traffic in Real-Time |
HITBSecConf2016 – Amsterdam
|
Hiding the network behind the network. Botnet proxy business model |
VB2014 Seattle
|
Can we trust a trustee? An in-depth look into the digitally signed malware industry |
VB2014 Seattle
|
Labelling spam through the analysis of protocol patterns |
VB2014 Seattle
|
It has a EULA, it must be legit |
VB2014 Seattle
|
Google and Apple markets: are their applications really secure?! |
VB2013 Berlin
|
Digging into Facebook ads: finding clues that indicate a scam pattern |
VB2013 Berlin
|
The ransomware strikes back |
VB2013 Berlin
|