Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs RSAC Abu Dhabi 2016
Harnessing Intel Processor Trace on Windows for Vulnerability Discovery BlueHat v16
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic WOOT '16
HTTP/2 & QUIC - Teaching Good Protocols To Do Bad Things Black Hat USA 2016
Extending Your Security beyond Traditional Safe Borders with OpenDNS RSAC Asia Pacific & Japan 2016
10 Easy Steps to Building a Successful Extended Security Team RSAC USA 2016
Privacy, Security, IT and the New European General Protection Regulation RSAC USA 2016
Automating Linux Malware Analysis Using Limon Sandbox Black Hat Europe 2015
Cisco’s Security Dojo: Raising the Application Security Awareness of 20,000+ AppSec USA 2015
Inter-VM data exfiltration: The art of cache timing covert channel on x86 multi-core DEF CON 23