Twist & Shout: Ferris Bueller's Guide to Abuse Domain Permutations |
BSidesSF2019
|
Pose a Threat: How Perceptual Analysis Helps Bug Hunters |
APPSEC CALIFORNIA 2019
|
Game of Drones: Putting the Emerging "Drone Defense" Market to the Test |
DEF CON 25
|
Weaponizing Machine Learning: Humanity Was Overrated Anyway |
DEF CON 25
|
DC to DEF CON: Q&A; with Congressmen James Langevin and Will Hurd |
DEF CON 25
|
Game over, man! – Reversing Video Games to Create an Unbeatable AI Player |
DEF CON 24
|
Samsung Pay: Tokenized Numbers, Flaws and Issues |
DEF CON 24
|
RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFID |
DEF CON 23
|
Hacking Smart Safes: On the "Brink" of a Robbery |
DEF CON 23
|
Bypass Surgery Abusing Content Delivery Networks with Server-Side-Request Forgery (SSRF) Flash and DNS |
Black Hat USA 2015
|