Dave Dittrich [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Avoiding default passwords and secrets breaches using open source Helping everyone from open source developers to reporters and campaign staff toorcon2018SanDiego-2018 - San Diego, USA
The Legal & Ethical Challenges with Agressive Computer Security Research & Operations Actions ACSC-2015 - Canberra,Austrailia
Exploiting End Points, Devices, and the Internet of Things SuitsandSpooks-2014 - Washington,USA
Can Companies Afford an Active Defense Strategy? SuitsandSpooks-2014 - Washington,USA
So You Want to Take Over a Botnet... 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats-2012 - San Francisco, USA Botnets
Ethics In Botnet Research 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2009 - Boston, USA Security
Understanding Emerging Threats: The Case Of Nugache SOURCE Boston-2008 - Boston, USA Security Malware Botnets
Computer System Security: Is There Really A Threat? 9th USENIX Security Symposium-2000 - Denver, USA Security