Presentation | Speaker | Slides | ||
---|---|---|---|---|
De Mysteriis Dom Jobsivs: Mac EFI Rootkits |
Snare |
![]() |
||
Exploiting Internal Network Vulns via the Browser Using BeEF Bind |
Ty Miller & Michele Orru |
![]() |
||
Android Malware Detection in the Cloud |
Hermes Li |
![]() |
||
Thar' be Vuln. ID's Here - A Data Mining Case Study |
Matt J |
![]() |
||
Practical Attacks on Payment Gateways |
Eldar Marcussen |
![]() |
||
Targeted Malware – Sophisticated Criminals or Babytown Frolics? |
Josh Grunzweig & Ryan Merritt |
![]() |
||
Reverse Engineering a Mass Transit Ticketing System |
TrainHack |
![]() |
||
Firefox OS Application Security |
Paul Theriault |
![]() |
Not available |
|
FooCodeChu for Software Analysis, Malware Detection, & Vuln Research |
Silvio Cesare |
![]() |
||
Homebrew Defensive Security - Take Matters Into Your Own Hands |
Mimeframe |
![]() |
Not available |
|
The 3 Rings of the Data Breach Circus |
Mark Goudie |
![]() |
Not available |
|
Windows Kernel Fuzzing For Beginners |
Ben Nagy |
![]() |
||
The Impacts of Advancing Technology on Computer Forensics and E-Discovery |
Adam Daniel |
![]() |
Not available |
|
Monitoring repositories for Fun and Profit |
Louis Nyffenegger |
![]() |
Not available |
|
Examination of the VMWARE ESXi Binary Protocol Using Canape |
Alex Chapman |
|
||
Tracking vulnerable JARs |
David Jorm |
![]() |
||
Finding Needles in Haystacks (The Size of Countries) |
Michael Baker |
![]() |
||
How To Catch a Chameleon: Its All In Your Heap |
Steven Seeley |
![]() |
||
PiP: Remotely Injecting PHY-Layer Packets without a Bug or your Radio |
Travis Goodspeed |
![]() |
Not available |
|
Dr Strangelock ...or: How I Learned to Stop Worrying and Love the Key |
Graeme Bell |
![]() |
Not available |
|
Bluetooth Packet Sniffing Using Project Ubertooth |
Dominic Spill |
![]() |
||
Defibrillating Web Security |
Meder Kydyraliev |
![]() |
Not available |
|
Advanced Persistent Response |
Peleus Uhley |
![]() |
||
Detecting Source Code Re-use through Metadata and Context Partial Hashing |
Daniel Cabezas |
![]() |
Not available |
|
Hardware Backdooring is Practical |
Jonathan Brossard |
![]() |
||
Operation Damara & Operation Craft |
Alex Tilley |
![]() |
Not available |
|
Binary Instrumentation for Android |
Collin Mulliner |
![]() |
||
A Tale of Two Firefox Bugs |
Fionnbharr Davies |
![]() |
Not available |
|
The Blackhole Exploit Kit Spam Runs |
Jon Oliver |
![]() |