Who Needs Macros? | Threat Actors Pivot to Abusing Explorer and Other LOLBins via Windows Shortcuts
Aleksandar Milenkoski, Jim Walter
4 August, 2022
Inside Malicious Windows Apps for Malware Deployment
Aleksandar Milenkoski
14 July, 2022
The TPM: Technical Overview of Microsoft’s Interim Measures against CVE-2017-15361
Aleksandar Milenkoski
29 May, 2020
Device Guard Image Integrity: Function Invocation Paths between ci.dll and skci.dll
Aleksandar Milenkoski
22 November, 2019
Windows Defender Application Control: Image verification
Aleksandar Milenkoski
25 October, 2019
Windows Defender Application Control: Initialization
Dominik Phillips, Aleksandar Milenkoski
25 October, 2019
Device Guard Image Integrity: Architecture Overview
Aleksandar Milenkoski
25 October, 2019
Virtual Secure Mode: Initialization
Dominik Phillips, Aleksandar Milenkoski
23 May, 2019
Virtual Secure Mode: Protections of Communication Interfaces
Aleksandar Milenkoski
23 May, 2019
Virtual Secure Mode: Communication Interfaces
Aleksandar Milenkoski
23 May, 2019
Virtual Secure Mode: Architecture Overview
Aleksandar Milenkoski
23 May, 2019
ELAM: The Windows Defender ELAM Driver
Aleksandar Milenkoski
21 May, 2019
The TPM: Workflow of the Manual and Automatic TPM Provisioning Processes
Aleksandar Milenkoski
21 May, 2019
The TPM: Integrity Measurement
Aleksandar Milenkoski
21 May, 2019
The TPM: Communication Interfaces
Aleksandar Milenkoski
21 May, 2019