Most Ransomware Isnt as Complex as You Might Think |
Black Hat USA 2015
|
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces |
35th IEEE Symposium on Security and Privacy
|
ANUBIS - ANalyzing Unknown BInarieS - the automatic way |
VB2009 Geneva
|