2.8 KiB
layout, permalink, title
| layout | permalink | title |
|---|---|---|
| default | /content/ | Content |
Presentations
Reverse Engineering Malware 101
WiCys Conference 2017, DEF CON (Packet Hacking Village) 2017
.Net Hijacking to Defend Powershell slides
BSides 2017, CanSecWest 2017
Instegogram: Leveraging Instagram for C2 via Image Steganography slides
DefCon (Crypto Village) 2016
OSX Malware: Plists, Shell Scripts, and Objective-C, Oh-My! slides
Mircon 2014
DLL Side-Loading: A Thorn in the Side of the Anti-Virus (AV) Industry slides
RSA Conference 2014
Vehicle Embedded System Imaging & Extraction, Examination and Exploitation
DoD Cyber Crime Conference 2012
Whitepapers
Malware Dynamic Behavior Classification: SVM-HMM applied to Malware API Sequencing
Johns Hopkins University
Dll Side-Loading: A Thorn in the Side of the Anti-Virus Industry
FireEye
Work Blogs
WCry/WanaCry Ransomware Technical Analysis
Endgame
Instegogram: Leveraging Instagram for C2 via Image Steganography
Endgame
Your Package Has Been Successfully Encrypted: TeslaCrypt 4.1A and the Malware Attack Chain
Endgame
DOS AND DON’TS WITH DOCUMENT EMBEDDED OBJECTS
FireEye
FireEye
A NOT-SO CIVIC DUTY: ASPROX BOTNET CAMPAIGN SPREADS COURT DATES AND MALWARE
FireEye
TARGETED ATTACK TREND ALERT: PLUGX THE OLD DOG WITH A NEW TRICK
FireEye
Education
MS in Information Systems Engineering, Johns Hopkins University
BA in Communication Design, Computer Science, Texas State University