KEYNOTE 2: Cyber Arms Race |
HITBSecConf2018 – Dubai
|
Offensive Memory Forensics |
HITBSecConf2018 – Beijing
|
Analysing compiled binaries using logic |
VB2018 Montreal
|
An ice-cold Boot to break BitLocker |
BlueHat v18
|
Ghost in the Locks: Owning Electronic Locks Without Leaving a Trace |
HITB GSEC 2018 – Singapore
|
The Epocholypse 2038: What's in Store for the Next 20 Years |
Black Hat USA 2017
|
Kernel Exploit Hunting and Mitigation |
HITBSecConf2016 – Amsterdam
|
C&C-as-a-Service: abusing third-party web services as C&C channels |
VB2015 Prague
|
Dynamic Flash Instrumentation for Fun and Profit |
Black Hat USA 2014
|
Governments As Malware Authors: The Next Generation |
Black Hat USA 2014
|