Michael Scovetta, profile picture

Michael Scovetta

Sort by
Peter Norvig - NYC Machine Learning 2013
Android Attacks
Strategic Surprise
Stackjacking
Modern Kernel Pool Exploitation: Attacks and Techniques
Exploitation and State Machines
Don't Give Credit: Hacking Arcade Machines
Attacking the WebKit Heap
The Listening: Email Client Backdoor
DEFCON 18- These Aren't the Permissions You're Looking For
If You Don't Like the Game, Hack the Playbook... (Zatko)
Scaling Cyberwarfare (Roelker)
High Assurance Systems (Fisher)
PROCEED and Crowd-Sourced Formal Verification
National Cyber Range (Ranka)