Some Experiments with Code Similarity |
HITBSecConf2018 – Beijing
|
Why We are Not Building a Defendable Internet |
Black Hat Asia 2017
|
Locknote: Conclusions and Key Takeaways from Black Hat Asia 2017 |
Black Hat Asia 2017
|
Panel: What You Need to Know About the Changing Regulatory Landscape in Information Security |
Black Hat Europe 2015
|
Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges |
Black Hat USA 2015
|
Exploitation and State Machines |
INFILTRATE 2011
|