Presentation | Speaker | Slides | ||
---|---|---|---|---|
De Mysteriis Dom Jobsivs: Mac EFI Rootkits |
Snare |
|||
Exploiting Internal Network Vulns via the Browser Using BeEF Bind |
Ty Miller & Michele Orru |
|||
Android Malware Detection in the Cloud |
Hermes Li |
|||
Thar' be Vuln. ID's Here - A Data Mining Case Study |
Matt J |
|||
Practical Attacks on Payment Gateways |
Eldar Marcussen |
|||
Targeted Malware – Sophisticated Criminals or Babytown Frolics? |
Josh Grunzweig & Ryan Merritt |
|||
Reverse Engineering a Mass Transit Ticketing System |
TrainHack |
|||
Firefox OS Application Security |
Paul Theriault |
Not available |
||
FooCodeChu for Software Analysis, Malware Detection, & Vuln Research |
Silvio Cesare |
|||
Homebrew Defensive Security - Take Matters Into Your Own Hands |
Mimeframe |
Not available |
||
The 3 Rings of the Data Breach Circus |
Mark Goudie |
Not available |
||
Windows Kernel Fuzzing For Beginners |
Ben Nagy |
|||
The Impacts of Advancing Technology on Computer Forensics and E-Discovery |
Adam Daniel |
Not available |
||
Monitoring repositories for Fun and Profit |
Louis Nyffenegger |
Not available |
||
Examination of the VMWARE ESXi Binary Protocol Using Canape |
Alex Chapman |
|||
Tracking vulnerable JARs |
David Jorm |
|||
Finding Needles in Haystacks (The Size of Countries) |
Michael Baker |
|||
How To Catch a Chameleon: Its All In Your Heap |
Steven Seeley |
|||
PiP: Remotely Injecting PHY-Layer Packets without a Bug or your Radio |
Travis Goodspeed |
Not available |
||
Dr Strangelock ...or: How I Learned to Stop Worrying and Love the Key |
Graeme Bell |
Not available |
||
Bluetooth Packet Sniffing Using Project Ubertooth |
Dominic Spill |
|||
Defibrillating Web Security |
Meder Kydyraliev |
Not available |
||
Advanced Persistent Response |
Peleus Uhley |
|||
Detecting Source Code Re-use through Metadata and Context Partial Hashing |
Daniel Cabezas |
Not available |
||
Hardware Backdooring is Practical |
Jonathan Brossard |
|||
Operation Damara & Operation Craft |
Alex Tilley |
Not available |
||
Binary Instrumentation for Android |
Collin Mulliner |
|||
A Tale of Two Firefox Bugs |
Fionnbharr Davies |
Not available |
||
The Blackhole Exploit Kit Spam Runs |
Jon Oliver |