Licensed to Pwn: The Weaponization and Regulation of Security Research |
DEF CON 23
|
Debate: Internet GUN CONTROL - Are Pentesting Tools Good or Evil? |
RSAC USA 2013
|
The Three Myths of Cyberwar |
RSAC USA 2012
|
Using Immunity Debugger to Write Exploits |
POC2007
|