Analyzing UEFI BIOSes from Attacker & Defender Viewpoints |
Black Hat Europe 2014
|
SENTER Sandman: Using Intel TXT to Attack BIOSes |
HITBSecConf2014 – Malaysia
|
Watching the Watcher: Extreme Privilege Escalation on Windows 8/UEFI Systems |
HITBSecConf2014 – Malaysia
|
Last-minute paper: Into the unknown: how to detect BIOS-level attackers |
VB2014 Seattle
|
Extreme Privilege Escalation on Windows 8/UEFI Systems |
Black Hat USA 2014
|
Timing-Based Attestation: Sexy Defense, or the Sexiest? |
ShmooCon 2014
|
Copernicus 2, SENTER the Dragon |
CanSecWest 2014
|