Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
Cloudy with a Chance of Sploits RSAC USA 2013
The dangers of per-user COM objects in Windows VB2011 Barcelona
Virtual machines for real malware capture and analysis VB2009 Geneva
Intentions of capitalistic malware VB2008 Ottawa
How secure is your virtualized network? VB2008 Ottawa
SCADA security - who is really in control of our control systems? VB2008 Ottawa
Malware forensics: detecting the unknown VB2008 Ottawa
Insecurity and malware in virtual universes VB2007 Vienna
Last-minute presentation: Novel code obfuscation with COM VB2007 Vienna
Corporate threat assessment matrix VB2003 Toronto