Black Hat USA 2017 Tracking Ransomware End to End

Black Hat USA 2017 Tracking Ransomware End to End

Tracking Ransomware End to EndПодробнее

Tracking Ransomware End to End

The Adventures of AV and the Leaky SandboxПодробнее

The Adventures of AV and the Leaky Sandbox

Tracking desktop ransomware payments end to end - Blackhat USA'17Подробнее

Tracking desktop ransomware payments end to end - Blackhat USA'17

WiFuzz: Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic HandshakeПодробнее

WiFuzz: Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic Handshake

Tracking Ransomware End to EndПодробнее

Tracking Ransomware End to End

Digital Vengeance: Exploiting the Most Notorious C&C ToolkitsПодробнее

Digital Vengeance: Exploiting the Most Notorious C&C Toolkits

Cloak & Dagger: From Two Permissions to Complete Control of the UI Feedback LoopПодробнее

Cloak & Dagger: From Two Permissions to Complete Control of the UI Feedback Loop

How We Created the First SHA-1 Collision and What it Means for Hash SecurityПодробнее

How We Created the First SHA-1 Collision and What it Means for Hash Security