Title |
Conference |
Tags |
DLL Hijacking: The Eighth Circle of DLL Hell |
BSidesUK-2015 - London,UK |
|
Practical Security Assessments of IoT Devices and Systems |
CrestCon-2015 - London,UK |
|
Defensive Security Research is Sexy Too (& Real Sign of Skill) |
BSidesLondon-2014 - London,UK |
|
Finding the Weak Link in Binaries |
HITBSecConf Malaysia-2012 - KL, Malaysia |
Windows
Static Analysis
|
Software Security Austerity Software security debt in modern software development |
44Con-2012 - London, UK |
Security
|
Finding the weak link in Windows binaries |
Security B-Sides London-2012 - London, UK |
Code Analysis
Attack Planning
Windows
|
Building A Sec Community |
ZaCon-2 - Johannesburg, South Africa |
Security
Others
Deep Knowledge
Community
|
Mobile And Embedded Security - The Elephant Under The Carpet
|
BlueHat-2007 - Redmond, USA |
Security
|
Gs And Aslr In Windows Vista |
Blackhat Europe-2007 - Amsterdam, The Netherlands |
Security
|
Attacks And Counter Measures In 2.5G And 3G Cellular Ip Networks |
HITBSecConf Malaysia-2004 - Kuala Lampur, Malaysia |
Security
|