Process Control Through Counterfeit Comms: Using and Abusing Built-In Functionality to Own a PLC |
ShmooCon 2019
|
Where 2 Worlds Collide: Bringing Mimikatz et al to UNIX |
Black Hat Europe 2018
|
Playback: a TLS 1.3 story |
DEF CON 26
|
You can run, but you can't hide. Reverse engineering using X-Ray. |
DEF CON 26
|
Playback: A TLS 1.3 Story |
Black Hat USA 2018
|
Spymaster Challenge |
BSidesSF2018
|
Spymaster Challenge |
BSidesSF2018
|
Skype & Type: Keystroke Leakage over VoIP |
Black Hat USA 2017
|
What Malware Authors Don't Want You to Know - Evasive Hollow Process Injection |
Black Hat Asia 2017
|
FIRST: Changing How You Reverse Engineer |
Zeronights Moscow 2016
|