MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense |
ACM CCS 2018
|
DIFUZE:Interface Aware Fuzzing for Kernel Drivers |
ACM CCS 2017
|
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance |
ACM CCS 2017
|
Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross-Device Tracking |
Black Hat Europe 2016
|
SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis |
37th IEEE Symposium on Security and Privacy
|
Finding Triggered Malice in Android Apps |
RSAC USA 2016
|
Using Static Binary Analysis to Find Vulnerabilities and Backdoors in Firmware |
Black Hat USA 2015
|
Evasive Malware Exposed and Deconstructed |
RSAC USA 2015
|
Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware |
Black Hat USA 2014
|
Understanding and Fighting Evasive Malware |
RSAC Europe 2013
|