Follow-Up to LAW-T06: Hot Topics in Cyber-Law 2019 |
RSAC USA 2019
|
CALDERA: Automating Adversary Emulation |
Black Hat Europe 2017
|
Use Their Machines Against Them: Loading Code with a Copier |
DEF CON 24
|
Samsung Pay: Tokenized Numbers, Flaws and Issues |
DEF CON 24
|
ThunderStrike 2: Sith Strike |
Black Hat USA 2015
|
Analyzing UEFI BIOSes from Attacker & Defender Viewpoints |
Black Hat Europe 2014
|
Last-minute paper: Into the unknown: how to detect BIOS-level attackers |
VB2014 Seattle
|
Extreme Privilege Escalation on Windows 8/UEFI Systems |
Black Hat USA 2014
|
The Common Malware Enumeration Initiative |
VB2006 Montreal
|