Tales from the SOC: Real-world Attacks Seen Through Azure ATP and Windows Defender ATP |
BlueHat v18
|
Scaling Security Scanning |
BlueHat v18
|
Malicious User Profiling Using a Deep Neural Net |
BlueHat v18
|
The Matrix has you - protecting Linux using deception |
BlueHat v18
|
Retpoline - the Anti-spectre type 2 Mitigation in Windows |
BlueHat v18
|
Linear Time Shellcode Detection Using State Machines and Operand Analysis on the Runtime |
BlueHat v18
|
Crafting synthetic attack examples from past cyber-attacks for applying Supervised Machine Learning in Cyber Defense |
BlueHat v18
|
Protecting the Protector, Hardening machine learning defenses against adversarial attacks |
BlueHat v18
|
Badly behaving scripts: Meet AMSI script behavior instrumentation and machine learning |
BlueHat v18
|
Return of the kernel rootkit malware (on Windows 10) |
BlueHat v18
|