[HITB Malaysia 2011] Exploit Automation
[Kiwicon 2011] Post Memory Corruption Memory Analysis
[Blackhat US 2011] Post Memory Corruption Memory Analysis
[CCC-28c3] Post Memory Corruption Memory Analysis
[HackInTheBox] Breaking virtualization by any means
[Telecomix] Zero crypto attacks against preboot authentication passwords
[Ruxcon Monthly Sydney 2011] Proprietary Protocols Reverse Engineering : Research leads
[Syscan360 2013] Brossard Jonathan
[Defcon] Hardware backdooring is practical
Hardware backdooring is practical
[2013 syscan360] Jonathan Brossard_katsuni理论介绍以及在沙盒和软件仿真方面的应用
[Hackito2012] Hardware backdooring is practical
[Ruxcon 2011] Post Memory Corruption Memory Analysis
[DEFCON] Bypassing preboot authentication passwords by instrumenting the BIOS keyboard buffer
[DEFCON 16] Bypassing pre-boot authentication passwords by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[HES 2010] Breaking Virtualization By Switching To Virtual 8086 Mode
[H2HC Sao Paulo 2009] PreBoot Authentication Password Cracking on a budget
[HITB Amsterdam 2010]Breaking Virtualization By Switching To Virtual 8086 Mode Final
[h2hc] Generic exploitation of invalid memory writes
[Ruxcon] Breaking virtualization by switching the cpu to virtual 8086 mode