HAXPO: Infrared: Old Threat Meets New Devices |
HITBSecConf2019 - Amsterdam
|
Use Model to Deconstruct Threats: Detect Intrusion by Statistical Learning |
RSAC USA 2019
|
IoT Woodpecker: Intrusion-Detection On The Hardware Bus |
HITBSecConf2018 – Dubai
|
Are You Listening? Auditable & Provable Privacy of Smart Speakers |
HITBSecConf2018 – Dubai
|
CommSec: Solving The Last Mile Problem Between Machine Learning and Security Operations |
HITBSecConf2018 – Beijing
|
U2Fishing: potential security threat introduced by U2F key wrapping mechanism |
VB2018 Montreal
|
None of My Pixel is Your Business: Active Watermarking Cancellation Against Video Streaming Service |
Black Hat USA 2018
|
Mirror Mirror: Rooting Android 8 with a Kernel Space Mirroring Attack |
HITBSecConf2018 – Amsterdam
|
Eating The Core of an Apple: How to Analyze and Find Bugs in MacOS and iOS Kernel Drivers |
HITBSecConf2018 – Amsterdam
|
Ouroboros: Tearing Xen Hypervisor with the Snake |
Black Hat USA 2016
|