1. | Mobile Wanderlust Our Journey to Version 2 0 Sven Schleier & Carlos Holguera | 0 | |
|
2. | Securing an API Ecosystem with OAuth 2 0 Philippe De Ryck | 0 | |
|
3. | Mobile Security Attacks A Glimpse from the Trenches | 0 | |
|
4. | Migrating AMS IX to MPLS VPLS | 0 | |
|
5. | Dependency Track Steve Springett | 0 | |
|
6. | Christian Schneider, Alvaro Muoz Surviving the Java serialization apocalypse | 0 | |
|
7. | Very Pleasant Painful Networking The Highs and Lows of Building and Main'taining VPNs | 0 | |
|
8. | The National Infrastructure Assurance Council NIAC | 0 | |
|
9. | DHCPv6 state of the Union | 0 | |
|
10. | Research Forum Inter provider Coordination for Real Time Tracebacks | 0 | |
|
11. | blinc | 0 | |
|
12. | Inter AS Traffic Engineering Case Studies as Requirements for IPv6 Multihoming Solutions | 0 | |
|
13. | PETS Opening Remarks | 0 | |
|
14. | Differentially private partition selection | 0 | |
|
15. | FAMULUS Amateur Nuclear Fusion PN13 | 0 | |
|
16. | Daniel Demmler Privacy Preserving Interdomain Routing at Internet Scale | 0 | |
|
17. | Gene Branfield | 0 | |
|
18. | Hacking Web Apps Brent White | 0 | |
|
19. | Rohit Pitke Continuous Cloud Security Automation | 0 | |
|
20. | Cracking the Code of Mobile Application | 0 | |
|
21. | Topics of Interest Common NGINX Misconfigurations That Leave Your Web Server Open S Pearlman | 0 | |
|
22. | he Dark Side of Twitter 1 3 | 0 | |
|
23. | Panel | 0 | |
|
24. | Contain Yourself Building Secure Containers for Mobile Devices Ron Gutierrez | 0 | |
|
25. | PajamaCon AnonyMouse Hacker | 0 | |
|
26. | Why kidz couldn't care less about your password advice | 0 | |
|
27. | Alisa Pankova Preprocessing Based Verification of Multiparty Protocols with Honest Majority | 0 | |
|
28. | Defeating the Bowley, Forever Lock and Yuema 750 Mitch ‘Priyer’ Robert | 0 | |
|
29. | Practical Privacy Preserving K means Clustering | 0 | |
|
30. | Ostap Orobets Highly Efficient Server Aided 2PC for Mobiles | 0 | |
|
31. | Как избежать обнаружения кражи данных с помощью вредоносных методов шифрования | 0 | |
|
32. | Эффективное взаимодействие SOAR и SIEM систем для построения SOC | 0 | |
|
33. | Что нас ждет завтра на PHDays | 0 | |
|
34. | Актуальный рынок рекрутмента в ИТ и кибербезе | 0 | |
|
35. | Elonka's Journey Elonka Dunin | 0 | |
|
36. | g vrp | 0 | |
|
37. | Opening Remarks | 0 | |
|
38. | Rig the game in your favor Machine Learning is Accessible to Everyone James Church | 0 | |
|
39. | Open Source finals | 0 | |
|
40. | Panel BGP Security Requirements An Overview of Current Work in the IETF | 0 | |
|
41. | Matthieu BOUTHORS Cloud computing FR | 0 | |
|
42. | What is Going to Kill You and How Can You Stop It | 0 | |
|
43. | Face to Face the Arbiters of Security | 0 | |
|
44. | Access requests as a tool for activism | 0 | |
|
45. | The digital identity revolution great hopes or deep concerns | 0 | |
|
46. | PHDays IV CTF Legend part 2 | 0 | |
|
47. | Российские аппаратные платформы для решений по кибербезопасности уже правда или еще ужасная правда | 0 | |
|
48. | Lightning talks Ali Lange, Center for Democracy & Technology | 0 | Vlog |
|
49. | Pico wants you | 0 | |
|
50. | PETS2021 Town Hall | 0 | |
|
51. | Did you know this camera tracks your mood Modeling People's Privacy Expectations and | 0 | |
|
52. | Welcome | 0 | |
|
53. | HotPETs Opening Keynote Elissa M Redmiles | 0 | |
|
54. | How Not to Handle Keys Timing Attacks on FIDO Authenticator Privacy | 0 | |
|
55. | Отключаем макросы OCR против социальной инженерии | 0 | |
|
56. | Взлом аутентификации по крупному | 0 | |
|
57. | Экспертный центр мониторинга безопасности на PHDays 8 | 0 | |
|
58. | VSCode XP корреляции без боли и страданий | 0 | |
|
59. | Интервью с командами атаки | 0 | |
|
60. | Другая сторона DDoS | 0 | |
|
61. | Knock knock, who's there Identifying assets in the cloud Ben Sadeghipou | 0 | |
|
62. | Modern Malvertising and Malware web based exploit campaigns James Pleger | 0 | |
|
63. | Non traditional Encryption Problems And Solutions Chuck Willis | 0 | |
|
64. | iOS Application Defense iMAS Gregg Ganley | 0 | |
|
65. | how eff is making starttls resistant to active attacks jacob hoffman andrews yan zhu | 0 | |
|
66. | Real World Static Analysis For Real Humans Adrian Bravo & Nick Gonella | 0 | |
|
67. | Maya Kaczorowski Cryptic Dependencies and Cryptic Crosswords | 0 | |
|
68. | 06 13 2020 Care & Feeding of your Infosec vendor Eric Crutchlow | 0 | |
|
69. | Dan Blah Meredith Thank You for Protecting Human Rights HotPETs Keynote 2016 | 0 | |
|
70. | OWASP SERVERLESS TOP 10 Tal Melamed | 0 | |
|
71. | Chad Spensky SoK Privacy on Mobile Devices It’s Complicated | 0 | |
|
72. | Asbjørn R Thorsen | 0 | |
|
73. | Уязвимое мобильное приложение Allsafe глазами аналитика исходного кода с примерами для начинающих | 0 | |
|
74. | Популярные нетривиальные уязвимости в смарт контрактах Ethereum | 0 | |
|
75. | Социальная инженерия тенденции red team, технические аспекты kill chain и проектный опыт | 0 | |
|
76. | Кризис время возможностей для СОИ, специализированной облачной инфраструктуры | 0 | |
|
77. | Methodology for assessing the risks of successful social engineering attacks against companies | 0 | Vlog |
|
78. | Sqlmap Under the Hood | 0 | |
|
79. | Panel Discussion Characterizing Software Security as Business Risk 3 4 | 0 | Discussion |
|
80. | Web App Crypto A Study in Failure | 0 | |
|
81. | Sinking Your Hooks in Applications Richard Meester & Joe Rozner | 0 | |
|
82. | Paul RASCAGNERES & Hugo CARON Analyse et poneage d un botnet FR | 0 | |
|
83. | OWASP SAMM 2 Your Dynamic Software Security Journey John Ellingsworth | 0 | |
|
84. | Web Apps vs Blockchain DApps Smart Contracts Tools, Vulns And Standards Damian Rusinek | 0 | |
|
85. | Elisabeth Niekrenz Terrorfilter Die geplanten EU Terror Content Verordnung | 0 | |
|
86. | In Conversation with John Allan Namu and Melissa Chan | 0 | |
|
87. | matt oh Reverse Engineering Flash Memory For Fun and Benefit | 0 | |
|
88. | Как сделать человеческий фактор преимуществом киберучения как инструмент для отражения атак | 0 | |
|
89. | Lightning talks Arne Hintz, Cardiff University | 0 | |
|
90. | gynvael coldwind and unavowed | 0 | |
|
91. | HackerSpaces Panel Talk PN13 | 0 | |
|
92. | IPv6 Deployment on a Broadband Access Network | 0 | |
|
93. | OWASP Secure Coding Practices Quick Reference Guide 1 2 | 0 | Guide |
|
94. | Deaggregation Report | 0 | |
|
95. | ScriptProtect Mitigating Unsafe Third Party JavaScript Practices Marius Musch and Martin Johns | 0 | |
|
96. | Результативная кибербезопасность взгляд CISO | 0 | |
|
97. | ATOM A Generalizable Technique for Inferring Tracker Advertiser Data Sharing in the Online | 0 | |
|
98. | Anti OPSEC Ataques de contra inteligência em redes anônimas Victor de Queiroz | 0 | |
|
99. | Instant big data targeting | 0 | |
|
100. | Face Off Adversarial Face Obfuscation | 0 | |
|