Title |
Conference |
Tags |
WHY WE ARE NOT BUILDING A DEFENDABLE INTERNET |
BlackhatAsia-2017 - marina bay,singapore |
|
LOCKNOTE: CONCLUSIONS AND KEY TAKEAWAYS FROM BLACK HAT ASIA 2017 |
BlackhatAsia-2017 - marina bay,singapore |
|
PANEL: WHAT YOU NEED TO KNOW ABOUT THE CHANGING REGULATORY LANDSCAPE IN INFORMATION SECURITY |
BlackHatEU-2015 - amsterdam,netherlands |
|
EXPLOITING THE DRAM ROWHAMMER BUG TO GAIN KERNEL PRIVILEGES |
BlackhatUS-2015 - Las vegas,usa |
|
Keynote |
Hacker2HackerCon-2014 - sao paolo,brasil |
|
Keynote |
Area41-2014 - zurich,switzerland |
|
The many flavors of binary analysis |
grehack-2013 - Grenoble, France |
|
Keynote: |
SOURCEDublin-2013 - Dublin,Ireland |
|
Things one wants from a Heap Visualization Tool |
Hashdays-2012 - Lucerne,Switzerland |
Security
|
State Spaces And Exploitation
|
Infiltrate-2011 - Miami, USA |
Security
|
How To Notice When You Are Re-Owned |
t2-2010 - Helsinki, Finland |
Security
Others
|
Some Things That Every Vulnerability Developer Should Know |
t2-2010 - Helsinki, Finland |
Security
Exploitation
Development
|
Challenging conventional wisdom on byte signatures |
Virus Bulletin-2010 - Vancouver, Canada |
|
A Framework For Automated Architecture-Independent Gadget Search |
4th USENIX Workshop on Offensive Technologies -2010 - Washington DC, USA |
Security
|
Sharereing Is Caring |
CanSecWest-2010 - Vancouver, Canada |
|
Automated structural classification of malware |
DeepSec-2007 - Vienna,Austria |
|
Automated Unpacking and Malware Classification |
BlackHatAsia-2007 - Tokyo,Japan |
|
Structural Classification Of Malware
|
BlueHat-2007 - Redmond, USA |
Security
|
Bindiff Analysis
|
BlueHat-2006 - Redmond, USA |
Security
|
Re 2006: New Challenges Need Changing Tools |
DEF CON-14 - Las Vegas, USA |
Security
|
RE 2006: New Challenges Need Changing Tools |
BlackhatUSA-2006 - Las Vegas,USA |
|
Attacks On Uninitialized Local Variables |
Blackhat Europe-2006 - Amsterdam, The Netherlands |
Security
|
Attacks on Uninitialized Local Variables |
BlackHatDC-2006 - Washington,USA |
|
We Can Take It From Here |
DEF CON-12 - Las Vegas, USA |
Security
|
Diff, Navigate, Audit: Three Applications Of Graphs And Graphing For Security |
Blackhat USA-2004 - Las Vegas, USA |
Security
|
Automated Binary Reverse Engineering |
BlackHatWindows-2004 - Las Vegas,USA |
|
Automated Reverse Engineering |
BlackHatAsia-2003 - Marina Bay,Singapore |
|
Data Flow Analysis |
Blackhat Europe-2003 - Amsterdam, The Netherlands |
Security
Analysis
|
Graph-Based Binary Analysis |
BlackHatWindows-2003 - Las Vegas,USA |
|
Spass Mit Codeflow Analyse - Neuer Schwung Für Malware |
Chaos Communication Congress-19 - Berlin, Germany |
Security
Malware
|
Graph-Based Binary Analysis |
BlackHatAsia-2002 - Marina Bay,Singapore |
|
Professional Source Code Auditing |
Blackhat USA-2002 - Las Vegas, USA |
Deep Knowledge
Security
|
Graph-Based Binary Analysis |
Blackhat USA-2002 - Las Vegas, USA |
Security
Deep Knowledge
|
Project Buffer Overflow Searcher For Windows |
Chaos Communication Congress-18 - Berlin, Germany |
Security
|
Third Generation Exploits On Nt/Win2K Platforms |
Blackhat Europe-2001 - Amsterdam, The Netherlands |
Security
Exploitation
Development
Testing
|
Hit Them Where It Hurts: Finding Holes In Cots Software |
Blackhat USA-2001 - Las Vegas, USA |
Security
|
Exploiting Format String Vulnerabilities |
Chaos Communication Congress-17 - Berlin, Germany |
Security
|
Finding Holes In Closed-Source Software |
Blackhat Europe-2000 - Amsterdam, The Netherlands |
Security
|