Cloudy with a Chance of Sploits |
RSAC USA 2013
|
The dangers of per-user COM objects in Windows |
VB2011 Barcelona
|
Virtual machines for real malware capture and analysis |
VB2009 Geneva
|
Intentions of capitalistic malware |
VB2008 Ottawa
|
How secure is your virtualized network? |
VB2008 Ottawa
|
SCADA security - who is really in control of our control systems? |
VB2008 Ottawa
|
Malware forensics: detecting the unknown |
VB2008 Ottawa
|
Insecurity and malware in virtual universes |
VB2007 Vienna
|
Last-minute presentation: Novel code obfuscation with COM |
VB2007 Vienna
|
Corporate threat assessment matrix |
VB2003 Toronto
|