Georg Wicherski [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
A Reasonably Safe Travel Burner Laptop Setup t2-2015 - helsinki,finland
Hacking Like in the Movies: Visualizing Page Tables for Local Exploitation NordicSecCon-2013 - Reykjavik, Iceland
Hacking like in the Movies: Visualizing Page Tables for Local Exploitation BlackHatUSA-2013 - Las Vegas,USA
Secure Exploit Payload Staging…or how we did not kill an 0day at Defcon HoneyNet-2013 - Dubai,UAE Security
Secure Exploit Payload Staging t2-2012 - Helsinki, Finland Security
CROWDRE BlackHat USA-2012 - Las Vegas, USA Security
Exploiting a Coalmine: Abusing Complex Bugs in Webkit’s RenderArena Hackito Ergo Sum-2012 - Paris, France Instrumentation
Fun With The Ldt: Fast & Generic Shellcode Detection Infiltrate-2011 - Miami, USA Security
dirtbox, a highly scalable x86/Windows Emulator REcon-2010 - Montreal,Canada
Dirtbox, A Highly Scalable X86/Windows Emulator Blackhat USA-2010 - Las Vegas, USA Security Analysis Malware
Pehash: A Novel Approach To Fast Malware Clustering 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2009 - Boston, USA Security Malware
Collecting and Managing Accumulated Malware Automatically DeepSec-2007 - Vienna,Austria
Automated Botnet Detection And Mitigation Chaos Communication Congress-23 - Berlin, Germany Security Analysis Malware