Hunting Mac Malware with Memory Forensics
OMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
Linux Memory Analysis with Volatility
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced Malware
Investigating Cooridinated Data Exfiltration
My Keynote from BSidesTampa 2015 (video in description)
Unmasking Careto through Memory Forensics (video in description)
Effective Incident Response in Cloud Environments
Water of the Word (2nd edition)
Treasure and tragedy in kmem_cache mining for live forensics investigation
Proactive Measures to Defeat Insider Threat
Resume