2021
2018
2017
2016
2015
2014
-
Qubes R3/Odyssey initial source code release
Nov 27, 2014
-
Announcing Qubes OS Release 2!
Sep 26, 2014
-
Physical separation vs. Software compartmentalization
Aug 26, 2014
-
Qubes OS R2 rc2, Debian template, SSLed Wiki, BadUSB, and more...
Aug 6, 2014
-
Qubes OS R2 rc1 has been released!
Apr 20, 2014
-
Shattering the myths of Windows security
Jan 15, 2014
2013
2012
2011
-
Trusted Execution In Untrusted Cloud
Dec 13, 2011
-
Exploring new lands on Intel CPUs (SINIT code execution hijacking)
Dec 6, 2011
-
Playing with Qubes Networking for Fun and Profit
Sep 28, 2011
-
Qubes Beta 2 Released!
Sep 19, 2011
-
Anti Evil Maid
Sep 7, 2011
-
Interview about Qubes OS
Aug 30, 2011
-
My SSTIC 2011 slides
Jun 10, 2011
-
From Slides to Silicon in 3 years!
Jun 3, 2011
-
USB Security Challenges
May 31, 2011
-
(Un)Trusting the Cloud
May 28, 2011
-
The App-oriented UI Model and its Security Implications
May 21, 2011
-
Following the White Rabbit: Software Attacks Against Intel VT-d
May 13, 2011
-
The Linux Security Circus: On GUI isolation
Apr 23, 2011
-
Why the US "password revolution" won't work
Apr 16, 2011
-
Qubes Beta 1 has been released!
Apr 12, 2011
-
Partitioning my digital life into security domains
Mar 13, 2011
-
My documents got lost/stolen [offtopic]
Mar 8, 2011
2010
-
Update on Qubes
Dec 6, 2010
-
Qubes Alpha 3!
Oct 6, 2010
-
ITL is hiring!
Sep 28, 2010
-
On Thin Clients Security
Sep 13, 2010
-
(Un)Trusting your GUI Subsystem
Sep 9, 2010
-
Qubes, Qubes Pro, and the Future...
Sep 2, 2010
-
The MS-DOS Security Model
Aug 19, 2010
-
Skeletons Hidden in the Linux Closet: r00ting your Linux Desktop for Fun and Profit
Aug 17, 2010
-
Qubes Alpha 2 released!
Jul 1, 2010
-
Disposable VMs
Jun 1, 2010
-
On Formally Verified Microkernels (and on attacking them)
May 3, 2010
-
Evolution
May 1, 2010
-
Remotely Attacking Network Cards (or why we do need VT-d and TXT)
Apr 30, 2010
-
Introducing Qubes OS
Apr 7, 2010
-
Priorities
Jan 16, 2010
2009
-
Another TXT Attack
Dec 21, 2009
-
Evil Maid goes after TrueCrypt!
Oct 15, 2009
-
Intel Security Summit: the slides
Sep 22, 2009
-
About Apple’s Security Foundations, Or Lack Of Thereof...
Sep 2, 2009
-
PDF signing and beyond
Aug 26, 2009
-
Vegas Toys (Part I): The Ring -3 Tools
Aug 25, 2009
-
Black Hat 2009 Slides
Jul 30, 2009
-
Interview
Jul 16, 2009
-
Virtualization (In)Security Training in Vegas
Jun 12, 2009
-
Quest to The Core
Jun 9, 2009
-
More Thoughts on CPU backdoors
Jun 1, 2009
-
Thoughts About Trusted Computing
May 27, 2009
-
Trusting Hardware
Mar 25, 2009
-
The Sky Is Falling?
Mar 20, 2009
-
Attacking SMM Memory via Intel® CPU Cache Poisoning
Mar 19, 2009
-
Independent Attack Discoveries
Mar 13, 2009
-
Attacking Intel TXT: paper and slides
Feb 19, 2009
-
Nesting VMMs, Reloaded.
Feb 10, 2009
-
Closed Source Conspiracy
Jan 26, 2009
-
Why do I miss Microsoft BitLocker?
Jan 21, 2009
-
Attacking Intel® Trusted Execution Technology
Jan 5, 2009
2008
-
Microsoft executive "rebuts" our research!
Sep 7, 2008
-
Xen 0wning Trilogy: code, demos and q35 attack details posted
Sep 6, 2008
-
The three approaches to computer security
Sep 2, 2008
-
Teamwork & Crediting
Aug 31, 2008
-
Intel patches the Q35 bug
Aug 26, 2008
-
Attacking Xen: DomU vs. Dom0 consideration
Aug 20, 2008
-
Our Xen 0wning Trilogy Highlights
Aug 8, 2008
-
0wning Xen in Vegas!
Jul 7, 2008
-
Rafal Wojtczuk joins Invisible Things Lab
Jul 1, 2008
-
1984?
May 20, 2008
-
Vegas Training 2008
Apr 30, 2008
-
Research Obfuscated
Apr 14, 2008
-
The Most Stupid Security News Ever
Apr 12, 2008
-
The RSA Absurd
Apr 9, 2008
-
Kick Ass Hypervisor Nesting!
Mar 31, 2008
2007
-
Razor-Thin Hypervisors
Oct 25, 2007
-
Thoughts On Browser Rootkits
Oct 17, 2007
-
Tricky Tricks
Aug 31, 2007
-
Virtualization Detection vs. Blue Pill Detection
Aug 3, 2007
-
We're ready for the Ptacek's challenge!
Jun 28, 2007
-
Invisible Things Lab, Bitlocker/TPM bypassing and some conference thoughts
May 18, 2007
-
Understanding Stealth Malware
Apr 20, 2007
-
The Human Factor
Apr 1, 2007
-
The Game Is Over!
Mar 26, 2007
-
Handy Tool To Play with Windows Integrity Levels
Mar 5, 2007
-
Confusion About The "Joke Post"
Feb 13, 2007
-
Vista Security Model – A Big Joke?
Feb 12, 2007
-
Running Vista Every Day!
Feb 4, 2007
-
Beyond The CPU: Cheating Hardware Based RAM Forensics
Jan 20, 2007
-
Towards Verifiable Operating Systems
Jan 3, 2007
2006