ThunderStrike 2: Sith Strike |
DEF CON 23
|
ThunderStrike 2: Sith Strike |
Black Hat USA 2015
|
How Many Million BIOSes Would You Like to Infect? |
HITBSecConf2015 – Amsterdam
|
TECH TRAINING 4: Understanding x86-64 Assembly for Reverse Engineering & Exploits |
HITBSecConf2015 – Amsterdam
|
Are You Giving Firmware Attackers a Free Pass? |
RSAC USA 2015
|
Analyzing UEFI BIOSes from Attacker & Defender Viewpoints |
Black Hat Europe 2014
|
SENTER Sandman: Using Intel TXT to Attack BIOSes |
HITBSecConf2014 – Malaysia
|
TECH TRAINING 4: Understanding x86-64 Assembly for Reverse Engineering & Exploits |
HITBSecConf2014 – Malaysia
|
Watching the Watcher: Extreme Privilege Escalation on Windows 8/UEFI Systems |
HITBSecConf2014 – Malaysia
|
Last-minute paper: Into the unknown: how to detect BIOS-level attackers |
VB2014 Seattle
|