Michael Cherny [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
WELL THAT ESCALATED QUICKLY! HOW ABUSING DOCKER API LED TO REMOTE CODE EXECUTION SAME ORIGIN BYPASS AND PERSISTENCE IN THE HYPERVISOR VIA SHADOW CONTAINERS blackhat-2017 - las vegas,usa
Data and CyberLaw. CyberSecurityPrivacy-2017 - prishtina,kosovo
WATCHING THE WATCHDOG: PROTECTING KERBEROS AUTHENTICATION WITH NETWORK MONITORING BlackHatEU-2015 - amsterdam,netherlands
Why Does Database Patching Require A PhD? RSAeu-2013 - Europaplein, Amsterdam