Joanna Rutkowska [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
SECURITY THROUGH DISTRUSTING blackhateu-2017 - london,uk
Towards (reasonably) trustworthy x86 laptops CCC-2015 - hamburg,germany
Attacking Intel Trusted Execution Technology BlackHatDC-2009 - Washington,USA
Keynote - Security Challenges In Virtualized Environments CONFidence -2008 - Krakow, Poland Security
Detecting & Preventing The Xen Hypervisor Subversions Blackhat USA-2008 - Las Vegas, USA Security
Bluepilling The Xen Hypervisor Blackhat USA-2008 - Las Vegas, USA Security
Security Challenges In Virtualized Environments SecTor-2007 - Canada Security
Human Factor Vs. Technology SecTor-2007 - Canada Security
Beyond the CPU: Defeating Hardware Based RAM Acquisition Tools First-2007 - Seville,Spain
Beyond The CPU: Defeating Hardware Based RAM Acquisition Tools AUScert-2007 - Gold Coast, Australia
IsGameOver(), anyone? BlackHatDC-2007 - Washington,USA
Stealth Malware - Can Good Guys Win? Chaos Communication Congress-23 - Berlin, Germany Security Malware
Rootkits Vs. Stealth By Design Malware CONFidence -2006 - Krakow, Poland Security
Subverting Vista Kernel For Fun And Profit BlackHatAsia-2006 - Tokyo, Japan
Subverting Vista Kernel For Fun And Profit HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Malware Development Testing
Subverting Vista Kernel For Fun And Profit BlackhatUSA-2006 - Las Vegas,USA
Subverting Vista Kernel For Fun And Profit SyScan-2006 - Singapore Security Malware
Rootkits Vs. Stealth By Design Malware Blackhat Europe-2006 - Amsterdam, The Netherlands Security Malware
Rootkit Hunting vs. Compromise Detection BlackHatDC-2006 - Washington,USA
Hide-And-Seek: Defining the Roadmap for Malware Detection on Windows HITBMalaysia-2005 - Kuala Lumpur,Malaysia
Passive Covert Channels In The Linux Kernel Chaos Communication Congress-21 - Berlin, Germany Security