Theme Selector
Filter by
No Results Found, Please Adjust Your Search
hacking
Attacking encrypted USB keys the hard(ware) way
Black Hat USA 2017
hacking
Bad beat: practical attacks against poker cheating devices
Mar 2017
hacking
Royal flush: an in-depth look at poker cheating devices accessories
Nov 2016
hacking
Full(er) House: Exposing high-end poker cheating devices
Oct 2016
video game
I am a legend hacking hearthstone using statistical learning methods
CIG 2016
video game
Predicting Hearthstone game outcome with machine learning
Oct 2016
hacking
Cheating at poker - James Bond Style
Defcon 2016
hacking
Does dropping usb drives really work?
Black Hat 2016
hacking
What are malicious usb keys and how to create a realistic one?
Aug 2016
hacking
Concerns about usb security are real: 48% of people do plug-in usb drives found in parking lots
Apr 2016
hacking
The dark side of online poker or the commoditization and weaponization of big data and espionage
Feb 2016
hacking
What tools do the fbi use when seizing computers or the curious case of the mouse jiggler device
Jan 2016
network security
Understanding how tls downgrade attacks prevent email encryption
Dec 2015
video game
I am a legend: Hacking Hearthstone with machine-learning Defcon talk wrap-up
Sep 2014
web security
The end is nigh: generic solving of text-based captchas
WOOT 2014
video game
Predicting a Hearthstone opponent’s deck using machine learning
Aug 2014
video game
Pricing hearthstone cards with unique abilities: VanCleef and The Twilight Drake
Aug 2014
video game
I am a legend: hacking hearthstone with machine learning
Defcon 2014
video game
How to find undervalued Hearthstone cards automatically
Jul 2014
video game
Fuzzing online games
Defcon 2012
web security
The Art of Breaking and Designing CAPTCHAS
RSA 2012
web security
How we broke the nucaptcha video scheme and what we propose to fix it
Feb 2012
web security
Text-based captcha strengths and weaknesses
CCS 2011
web security
Towards secure embedded web interfaces
Usenix Security 2011
hacking
Beyond files recovery owade cloud-based forensic
Black hat 2011
web security
Tracking users that block cookies with a http redirect
Jul 2011
video game
Openconflict preventing real time map hacks in online games
S&P 2011
web security
The failure of noise-based non-continuous audio captchas
S&P 2011
hacking
Identifying internet explorer user with a smb query
Aug 2010
privacy
An analysis of private browsing modes in modern browsers
Usenix Security 2010
hacking
Framing attacks on smartphones and dumb routers: social sites tap-jacking and geo-localization attacks
WOOT 2010
hacking
Recovering windows secrets and efs certificates offline
WOOT 2010
video game
Kartograph
Defcon 2010
hacking
Bad memories
Black Hat & Defcon 2010
web security
The emergence of cross channel scripting
CACM 2010
web security
Busting frame busting a study of clickjacking vulnerabilities on popular sites
W2SP 2010
security
Reversing dpapi and stealing windows secrets offline
Black Hat DC 2010
web security
Xcs cross channel scripting and its impact on web applications
CCS 2009
web security
Decaptcha breaking 75% of ebay audio captchas
WOOT 2009
hacking
Embedded management interfaces emerging massive insecurity
Black Hat 2009