Hey Operator, Where’s Your Crane? Attacking Industrial Remote Controllers |
HITBSecConf2019 - Amsterdam
|
When Machines Can't Talk: Security and Privacy Issues of Machine-to-Machine Data Protocols |
Black Hat Europe 2018
|
Using Machine-Learning to Investigate Web Campaigns at Large |
HITBSecConf2018 – Dubai
|
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing |
WOOT '17
|
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery |
WOOT '17
|
Breaking the Laws of Robotics: Attacking Industrial Robots |
Black Hat USA 2017
|
ShieldFS: The Last Word in Ransomware Resilient File Systems |
Black Hat USA 2017
|
Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross-Device Tracking |
Black Hat Europe 2016
|
Pocket-Sized Badness: Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game |
Black Hat Europe 2016
|
Face in the Distorting Mirror: Revisiting Photo-based Social Authentication |
ACM CCS 2014
|