Sergey Bratus [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Invited Talk: Overlooked Foundations: Exploits as Experiments and Constructive Proofs in the Science-of-Security CSET-2017 - vancouver,canada
LangSec for Penetration Testing: How and Why ShmooCon-2017 - washington,usa
A Context-Aware Kernel IPC Firewall for Android ShmooCon-2017 - washington,usa
Keynote HardwearIO-2016 - the hague, netherlands
Fillory of PHY: Toward a Periodic Table of Signal Corruption Exploits and Polyglots in Digital Radio WOOT-2016 - austin,usa
INTRA-PROCESS MEMORY PROTECTION FOR APPLICATIONS ON ARM AND X86: LEVERAGING THE ELF ABI blackhatUS-2016 - las vegas,usa
Keynote (Title TBA) BsidesKnoxville-2016 - knowville,usa
Polyglots and Chimeras in Digital Radio Modes Recon-2015 - Montreal,Canada
Keynote Troopers-2015 - Heidelberg,Germany
Interrupt-oriented Bugdoor Programming: A minimalist approach to bugdooring embedded systems firmware ACSAC-2014 - new orleans,usa
DemystiPHYing 802.15.4 Digital Radio; or, How to Weaponize ingerprinting for PacketinPacket Mitigation Bypasses Hacker2HackerCon-2014 - sao paolo,brasil
For Want of a Nail (*): A LangSec look at parser bugs in the Pwnies Hacker2HackerCon-2014 - sao paolo,brasil
Keynote hushcon-2014 - Seattle,USA
Defining and Enforcing Intent Semantics at ABI level BlueHat-2014 - Redmond,USA
For Want of a Nail SecT-2014 - Fribourg,switzerland
Demystiphying and Fingerprinting the 802.15.4/ZigBee PHY BsidesLasVegas-2014 - las vegas,usa
Speaking the Local Dialect: Exploiting differences between IEEE 802.15.4 Receivers with Commodity Radios for fingerprinting, targeted attacks, and WIDS evasion WiSec-2014 - Oxford,UK
DemystiPHYing 802.15.4 Digital Radio; or, How to Weaponize Fingerprinting for Packet-in-Packet Mitigation Bypasses InfoSecSouthWest-2014 - Texas,USA
Making (and Breaking) an 802.15.4 WIDS Troopers-2014 - Heidelberg, Germany
Mithril: Cleaving parser differentials in ELF tools Sec-T-2013 - Stockholm,Sweden
“Weird Machines” in ELF: A Spotlight on the Underappreciated Metadata WOOT-2013 - Washington, DC
ELF Eccentricities, Any Input Is a Program: Weird Machines in ABI and architecture metadata Confidence-2013 - Krakow,Poland
Page Fault Liberation Army or Better Security Through Creative x86 Trapping HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands
You wouldn't share a syringe. Would you share a USB port? TROOPERS-2013 - Heidelberg, Germany Monitoring Hardware General USB
Page Fault Liberation Army Or Better Security Through Trapping Shmoocon-2013 - Washington,USA
From "Shotgun Parsers" to Better Software Stacks Shmoocon-2013 - Washington,USA
LangSec BruCON-2012 - Ghent, Belgium
Shotgun Parsers in the Crosshairs BruCON-2012 - Ghent, Belgium
Overwriting the Exception Handling Cache Pointer Dwarf Oriented Programming DEF CON-20 - Las Vegas, USA
Programming Weird Machines with ELF Metadata DEF CON-20 - Las Vegas, USA
Facedancer USB: Exploiting the Magic School Bus REcon-2012 - Montreal, Canada USB
Layers of misunderstanding, or how digital radio is not what you think BerlinSides-2012 - Berlin, Germany
[Strange and Radiant Machines in the PHY Layer] Hackito Ergo Sum-2012 - Paris, France Hardware Reverse Engineering
Theory of Insecurity TROOPERS-2012 - Heidelberg, Germany
The Science of Insecurity ShmooCon-2012 - Washington DC, USA
Exploiting The Hard-Working Dwarf Hackito Ergo Sum-2011 - Paris, France Security
Last Minute Change: Adventures In Scada TROOPERS-2011 - Heidelberg, Germany Security
Exploiting The Hard-Working Dwarf ShmooCon-2011 - Washington DC, USA Security
Hackers And Computer Science Chaos Communication Congress-27 - Berlin, Germany Security
Voyage Of The Reverser: A Visual Study Of Binary Species Blackhat USA-2010 - Las Vegas, USA Security Others Forensics
Dartmouth Internet Security Testbed (Dist): Building A Campus-Wide Wireless Testbed 2nd Workshop on Cyber Security Experimentation and Test -2009 - Montreal, Canada Security Wireless
Active 802.11 Fingerpinting: A Secret Handshake To Know Your Aps Blackhat USA-2008 - Las Vegas, USA Security
Fingerprinting Aps TROOPERS-2008 - Munich, German Wireless
Organizing And Analyzing Logdata With Entropy, Sergey Bratus TROOPERS-2008 - Munich, German Data Exfiltration
Active 802.11 Fingerpinting: Gibberish And “Secret Handshakes” To Know Your Ap ShmooCon-2008 - Washington DC, USA Security
Entropy-Based Data Organization Tricks For Log And Packet Capture Browsing DEF CON-15 - Las Vegas, USA Security
Simple Entropy-Based Heuristics For Log And Traffic Analysis ShmooCon-2007 - Washington DC, USA Security Analysis