Developing Trust and Gitting Betrayed |
Black Hat USA 2017
|
GPU Security Exposed |
Black Hat Europe 2016
|
Light-Weight Protocol! Serious Equipment! Critical Implications! |
DEF CON 24
|
Access Keys Will Kill You Before You Kill the Password |
Black Hat USA 2016
|
I Came to Drop Bombs: Auditing the Compression Algorithm Weapon Cache |
Black Hat USA 2016
|
Faux Disk Encryption: Realities of Secure Storage on Mobile Devices |
Black Hat Europe 2015
|
Implementing Practical Electrical Glitching Attacks |
Black Hat Europe 2015
|
Going AUTH the Rails on a Crazy Train |
Black Hat Europe 2015
|
Hack the Cloud Hack the Company: the Cloud Impact on Enterprise Security |
AppSec USA 2015
|
Bugged Files: Is Your Document Telling on You? |
DEF CON 23
|