Detecting Malicious Masquerading Processes |
BlueHat v16
|
Harnessing Intel Processor Trace on Windows for Vulnerability Discovery |
BlueHat v16
|
A Year of Hardening Adobe Flash Player |
BlueHat v16
|
Security of Open Source at Microsoft |
BlueHat v16
|
In-memory compromise detection as an Azure service |
BlueHat v16
|
Breaking Things Early: Designing Secure Containers |
BlueHat v16
|
Win32k Security Improvements: Past & Present |
BlueHat v16
|
What is Threat Intelligence? |
BlueHat v16
|
Identity Protection at scale - A Year in the Trenches with Microsoft Identity Protection team |
BlueHat v16
|
Fuzzing Cloud "Project Springfield" |
BlueHat v16
|