Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
Some Experiments with Code Similarity HITBSecConf2018 – Beijing
Why We are Not Building a Defendable Internet Black Hat Asia 2017
Locknote: Conclusions and Key Takeaways from Black Hat Asia 2017 Black Hat Asia 2017
Panel: What You Need to Know About the Changing Regulatory Landscape in Information Security Black Hat Europe 2015
Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges Black Hat USA 2015
Exploitation and State Machines INFILTRATE 2011