Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
ThunderStrike 2: Sith Strike DEF CON 23
ThunderStrike 2: Sith Strike Black Hat USA 2015
How Many Million BIOSes Would You Like to Infect? HITBSecConf2015 – Amsterdam
TECH TRAINING 4: Understanding x86-64 Assembly for Reverse Engineering & Exploits HITBSecConf2015 – Amsterdam
Are You Giving Firmware Attackers a Free Pass? RSAC USA 2015
Analyzing UEFI BIOSes from Attacker & Defender Viewpoints Black Hat Europe 2014
SENTER Sandman: Using Intel TXT to Attack BIOSes HITBSecConf2014 – Malaysia
TECH TRAINING 4: Understanding x86-64 Assembly for Reverse Engineering & Exploits HITBSecConf2014 – Malaysia
Watching the Watcher: Extreme Privilege Escalation on Windows 8/UEFI Systems HITBSecConf2014 – Malaysia
Last-minute paper: Into the unknown: how to detect BIOS-level attackers VB2014 Seattle