Jamie Butler [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
PANEL 3: Corporate Espionage and Insider Threat – Monitoring Outlier Behavior that Indicates Malicious Intent CyberSummitUSA-2015 - New york,usa
Physical Memory Forensics for Cache Defcon19-2011 - Las Vegas,USA
Physical Memory Forensics for Cache BlackhatUSA-2011 - Las Vegas,USA
Full Process Analysis And Reconstitution Of A Virtual Machine From The Native Host CanSecWest-2010 - Vancouver, Canada
Blackout: What Really Happened... BlackHatDC-2007 - Washington,USA
R^2: The Exponential Growth in Rootkit Techniques BlackhatUSA-2006 - Las Vegas,USA
RAIDE: Rootkit Analysis Identification Elimination v1.0 BlackhatUSA-2006 - Las Vegas,USA
Raide: Rootkit Analysis Identification Elimination Blackhat Europe-2006 - Amsterdam, The Netherlands Security Analysis
“Shadow Walker” — Raising The Bar For Rootkit Detection BlackHatAsia-2005 - Tokyo,Japan
“Shadow Walker ” — Raising The Bar For Rootkit Detection DEF CON-13 - Las Vegas, USA Security
“Shadow Walker” — Raising The Bar For Rootkit Detection Blackhat USA-2005 - Las Vegas, USA Security
“Shadow Walker” — Raising The Bar For Rootkit Detection BlackHatUSA-2005 - Las Vegas,USA
Vice—Catch The Hookers! DEF CON-12 - Las Vegas, USA Security
Vice - Catch The Hookers Blackhat USA-2004 - Las Vegas, USA Security
Dkom (Direct Kernel Object Manipulation) Blackhat Europe-2004 - Amsterdam, The Netherlands Security Rootkits Access
DKOM (Direct Kernel Object Manipulation) BlackHatWindows-2004 - Las Vegas,USA