Behind Enemy Lines: Inside the operations of a nation state’s cyber program |
ShmooCon 2019
|
Stealth Mango and the Prevalence of Mobile Surveillanceware |
Black Hat USA 2018
|
Fighting Targeted Malware in the Mobile Ecosystem |
Black Hat USA 2017
|
Mobile Espionage in the Wild: Pegasus and Nation-State Level Attacks |
Black Hat Europe 2016
|
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices |
RSAC USA 2015
|