Halvar Flake [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
WHY WE ARE NOT BUILDING A DEFENDABLE INTERNET BlackhatAsia-2017 - marina bay,singapore
LOCKNOTE: CONCLUSIONS AND KEY TAKEAWAYS FROM BLACK HAT ASIA 2017 BlackhatAsia-2017 - marina bay,singapore
PANEL: WHAT YOU NEED TO KNOW ABOUT THE CHANGING REGULATORY LANDSCAPE IN INFORMATION SECURITY BlackHatEU-2015 - amsterdam,netherlands
EXPLOITING THE DRAM ROWHAMMER BUG TO GAIN KERNEL PRIVILEGES BlackhatUS-2015 - Las vegas,usa
Keynote Hacker2HackerCon-2014 - sao paolo,brasil
Keynote Area41-2014 - zurich,switzerland
The many flavors of binary analysis grehack-2013 - Grenoble, France
Keynote: SOURCEDublin-2013 - Dublin,Ireland
Things one wants from a Heap Visualization Tool Hashdays-2012 - Lucerne,Switzerland Security
State Spaces And Exploitation Infiltrate-2011 - Miami, USA Security
How To Notice When You Are Re-Owned t2-2010 - Helsinki, Finland Security Others
Some Things That Every Vulnerability Developer Should Know t2-2010 - Helsinki, Finland Security Exploitation Development
Challenging conventional wisdom on byte signatures Virus Bulletin-2010 - Vancouver, Canada
A Framework For Automated Architecture-Independent Gadget Search 4th USENIX Workshop on Offensive Technologies -2010 - Washington DC, USA Security
Sharereing Is Caring CanSecWest-2010 - Vancouver, Canada
Automated structural classification of malware DeepSec-2007 - Vienna,Austria
Automated Unpacking and Malware Classification BlackHatAsia-2007 - Tokyo,Japan
Structural Classification Of Malware BlueHat-2007 - Redmond, USA Security
Bindiff Analysis BlueHat-2006 - Redmond, USA Security
Re 2006: New Challenges Need Changing Tools DEF CON-14 - Las Vegas, USA Security
RE 2006: New Challenges Need Changing Tools BlackhatUSA-2006 - Las Vegas,USA
Attacks On Uninitialized Local Variables Blackhat Europe-2006 - Amsterdam, The Netherlands Security
Attacks on Uninitialized Local Variables BlackHatDC-2006 - Washington,USA
We Can Take It From Here DEF CON-12 - Las Vegas, USA Security
Diff, Navigate, Audit: Three Applications Of Graphs And Graphing For Security Blackhat USA-2004 - Las Vegas, USA Security
Automated Binary Reverse Engineering BlackHatWindows-2004 - Las Vegas,USA
Automated Reverse Engineering BlackHatAsia-2003 - Marina Bay,Singapore
Data Flow Analysis Blackhat Europe-2003 - Amsterdam, The Netherlands Security Analysis
Graph-Based Binary Analysis BlackHatWindows-2003 - Las Vegas,USA
Spass Mit Codeflow Analyse - Neuer Schwung Für Malware Chaos Communication Congress-19 - Berlin, Germany Security Malware
Graph-Based Binary Analysis BlackHatAsia-2002 - Marina Bay,Singapore
Professional Source Code Auditing Blackhat USA-2002 - Las Vegas, USA Security Deep Knowledge
Graph-Based Binary Analysis Blackhat USA-2002 - Las Vegas, USA Security Deep Knowledge
Project Buffer Overflow Searcher For Windows Chaos Communication Congress-18 - Berlin, Germany Security
Third Generation Exploits On Nt/Win2K Platforms Blackhat Europe-2001 - Amsterdam, The Netherlands Security Exploitation Development Testing
Hit Them Where It Hurts: Finding Holes In Cots Software Blackhat USA-2001 - Las Vegas, USA Security
Exploiting Format String Vulnerabilities Chaos Communication Congress-17 - Berlin, Germany Security
Finding Holes In Closed-Source Software Blackhat Europe-2000 - Amsterdam, The Netherlands Security