I Trust My Zombies: A Trust-Enabled Botnet |
Black Hat Europe 2017
|
Software Grand Exposure: SGX Cache Attacks Are Practical |
WOOT '17
|
Towards a Policy-Agnostic Control-Flow Integrity Implementation |
Black Hat Europe 2016
|
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3 |
37th IEEE Symposium on Security and Privacy
|
Return to Where? You Cant Exploit What You Cant Find |
Black Hat USA 2015
|