Showing 4 results

37:13
Travel & Eventsresearch-presentationhybridjava

30:13
Unveiling New Attack Vectors in Bluetooth Vulnerability Discovery through Protocol State Machine
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridbluetooth

40:33
Bridging the Gap: Type Confusion and Boundary Vulnerabilities Between WebAssembly and JavaScript
Black Hat
6 months ago
Travel & Eventsresearch-presentationtechnical-deep-divev8

38:39
Travel & Eventsresearch-presentationtechnical-deep-divegoogle-quick-share