Brian Gorenc [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Keynote hacktivity2018-2018 - Budapest, Hungary
From Bounties to Bureaucracy - The Hidden Market Factors of Exploit Economics BSidesSanFrancisco-2018 - San Francisco, USA
L'art de l'évasion: Modern VMWare Exploitation Techniques offensivecon-2018 - berlin,germany
For the Greater Good: Leveraging VMware's RPC Interface for Fun & Profit by zeronights-2017 - moscow,russia
For the Greater Good: Leveraging VMware's RPC Interface for fun and profit codeblue-2017 - tokyo,japan
LEVERAGING VMWARE'S RPC INTERFACE FOR FUN AND PROFIT ruxcon-2017 - melbourne,austrailia
Transforming Open Source to Open Access in Closed Applications: Finding Vulnerabilities in Adobe Reader's XSLT Engine syscan-2017 - beijing,china
Transforming Open Source to Open Access in Closed Applications Recon-2017 - brussels,belgium
Hacker-Machine Interface - State of the Union for SCADA HMI Vulnerabilities Defcon-2016 - las vegas,usa
Abusing Adobe Reader’s JavaScript APIs Defcon-2015 - Las vegas,usa
ABUSING SILENT MITIGATIONS - UNDERSTANDING WEAKNESSES WITHIN INTERNET EXPLORERS ISOLATED HEAP AND MEMORYPROTECTION BlackhatUS-2015 - Las vegas,usa
Abusing Silent Mitigations Recon-2015 - Montreal,Canada
Blowing up the Celly - Building Your Own SMS/MMS Fuzzer Ruxcon-2014 - melbourne,austrailia
Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways RuxconBreakpoint-2014 - melbourne,austrailia
Blowing up the Celly - Building Your Own SMS/MMS Fuzzer defcon-2014 - las vegas,usa
THINKING OUTSIDE THE SANDBOX - VIOLATING TRUST BOUNDARIES IN UNCOMMON WAYS BlackHatUS-2014 - las vegas,usa
Handling Zero Day Disclosures: You're Doing it Wrong RSACon-2014 - San Francisco, USA
Java Every-Days: Exploiting Software Running on 3 Billion Devices DEFCON-2013 - Las Vegas,Nevada
Java Every-Days: Exploiting Software Running on 3 Billion Devices BlackHatUSA-2013 - Las Vegas,USA