Title |
Conference |
Tags |
ANALYSIS OF THE ATTACK SURFACE OF WINDOWS 10 VIRTUALIZATION-BASED SECURITY |
blackhatUS-2016 - las vegas,usa |
|
Gadgets Zoo: Bypassing Control Flow Guard in Windows 10 |
DerbyCon-2015 - louisville,USA |
|
LOL (Layers On Layers) – Bypassing Endpoint Security for Fun and Profit |
HITBamsterdam-2015 - Amsterdam,Netherlands |
|
Attacks on UEFI Security |
CanSecWest-2015 - Vancouver,Canada |
|
Attacks on UEFI security, inspired by Darth Venamis's misery and Speed Racer |
CCC-2014 - Hamburg,Germany |
|
LESSONS LEARNED FROM EIGHT YEARS OF BREAKING HYPERVISORS |
BlackHatEU-2014 - amsterdam,netherlands |
|
POACHER TURNED GAMEKEEPER: LESSONS LEARNED FROM EIGHT YEARS OF BREAKING HYPERVISORS |
BlackHatUS-2014 - las vegas,usa |
|
LOL (Layers On Layers) – Bypassing Endpoint Security for Fun and Profit |
HackInTheBox-2014 - Amsterdam,Netherlands |
|
LOL (Layers On Layers) - bypassing endpoint security for fun and profit |
BSidesLondon-2014 - London,UK |
|
The Sandbox Roulette - Are you ready for the gamble? |
BlackHat EU-2013 - Amsterdam, Netherlands |
Introductory
Attack
Sandbox
|
A stitch in time saves nine: a case of multiple operating system vulnerability |
BlackHat USA-2012 - Las Vegas, USA |
Processor Flaw
Multiple Platforms
|
Introducing Ring -3 Rootkits |
Blackhat USA-2009 - Las Vegas, USA |
Security
Rootkits
|
Attacking Intel® Bios |
Blackhat USA-2009 - Las Vegas, USA |
Security
|
Attacking Intel Trusted Execution Technology |
BlackHatDC-2009 - Washington,USA |
|
Detecting & Preventing The Xen Hypervisor Subversions |
Blackhat USA-2008 - Las Vegas, USA |
Security
|
Subverting The Xen Hypervisor |
Blackhat USA-2008 - Las Vegas, USA |
Security
|
Academic Tools And Real-Life Bug Finding In Win32 |
Chaos Communication Congress-22 - Berlin, Germany |
Security
|