Will You Ever Be Able to Trust Social Networks? |
RSAC USA 2013
|
LAST-MINUTE PAPER: Operation ShadySHARE - towards better industry collaboration |
VB2011 Barcelona
|
Following the tracks: understanding snowshoe spam |
VB2011 Barcelona
|
Fast fingerprinting of OLE2 files: heuristics for detection of exploited OLE2 files based on specification non-conformance |
VB2011 Barcelona
|
Strategies for prioritization of malicious URL re-evaluation |
VB2011 Barcelona
|
Finding rules for heuristic detection of malicious PDFs: with analysis of embedded exploit code |
VB2010 Vancouver
|
'Want my autograph?': The use and abuse of digital signatures by malware |
VB2010 Vancouver
|
Standards and policies on packer use |
VB2010 Vancouver
|
The partnerka - what is it, and why should you care? |
VB2009 Geneva
|
Last-minute presentation: Race to zero with online scanners |
VB2008 Ottawa
|