2022-01-17 | An Anonymous Fair Exchange E Commerce Protocol | 41:37 | 8 | Guide |
|
2022-01-17 | Evolving the Internet | 1:01:48 | 0 | Guide |
|
2022-01-17 | Developing Data Mining Techniques for Intrusion Detection A Progress Report | 1:00:27 | 15 | Guide |
|
2022-01-17 | The Holy Grail of E Business Risk Management Creating and Sustaining the Ins | 1:07:35 | 0 | Guide |
|
2022-01-17 | Open Source Issues and Opportunities for Tripwire | 58:07 | 3 | Guide |
|
2022-01-17 | Commercial High Resolution Satellite Imagery Polic | 53:16 | 0 | Guide |
|
2022-01-17 | The Future of Information Security Technologies | 43:56 | 0 | Guide |
|
2022-01-17 | NLP for IAS Overview and Implementations | 49:57 | 1 | Guide |
|
2022-01-17 | Automatic identification of classified documents | 1:00:44 | 1 | Guide |
|
2022-01-17 | The Challenge of Secure Software | 1:05:15 | 0 | Guide |
|
2022-01-17 | Machine Learning Techniques for Anomaly Detection in Computer Security | 57:54 | 1 | Guide |
|
2022-01-17 | Investigating Computer Security Incidents | 1:01:53 | 1 | Guide |
|
2022-01-17 | Tracing Denial of Service Attacks or why we may never know who attacked Yaho | 59:30 | 0 | Guide |
|
2022-01-17 | Static Checking of Interrupt Driven Software | 54:19 | 0 | Guide |
|
2022-01-17 | Information Assurance Challenges for the 21st Century | 47:07 | 2 | Guide |
|
2022-01-17 | The IRDB Project An Incident Response Database For Gathering Cost And Incide | 56:37 | 10 | Guide |
|
2022-01-17 | Richard Stotts, Jerome Webb &amp Matthew Beebe | 1:00:05 | 2 | Guide |
|
2022-01-17 | Implications of Mobile Code on Microsoft Platforms | 1:03:56 | 0 | Guide |
|
2022-01-17 | Architectures and Components for High Assurance Security | 52:20 | 2 | Guide |
|
2022-01-17 | Balancing Big Brother | 1:41:41 | 0 | Guide |
|
2022-01-17 | KHIP A Scalable Protocol for Secure Multicast Routing | 46:26 | 4 | Guide |
|
2022-01-17 | Defeating Bluetooth Low Energy 5 PRNG for fun and jamming Damien Cauquil | 44:52 | 8 | |
|
2022-01-17 | Tales from professional thieves Dan McInerney and Justin Wynn | 54:21 | 5 | |
|
2022-01-17 | BruCON Opening | 3:47 | 3 | |
|
2022-01-17 | BruCON Closing | 4:41 | 0 | |
|
2022-01-17 | Cloud SIEM What happened and what's next Gunter Ollmann | 56:06 | 8 | |
|
2022-01-17 | Security transition from 4G to 5G are we secure enough Altaf Shaik and Ravisha | 58:18 | 13 | |
|
2022-01-17 | Internet Scale analysis of AWS Cognito Security Andres Riancho | 56:45 | 20 | |
|
2022-01-17 | It takes a village Kimber Dowsett | 52:16 | 2 | |
|
2022-01-17 | Automated adversary emulation using Caldera Erik Van Buggenhout | 1:00:50 | 21 | |
|
2022-01-17 | Atomic Threat Coverage being Threat Centric Daniil Yugoslavskiy and Mateusz Wy | 26:52 | 23 | |
|
2022-01-17 | Why isn't infosec working Did you turn it off and back on again Rob Fuller | 58:23 | 0 | |
|
2022-01-17 | Incident response in the cloud foggy with a ray of sunshine Jeroen Vandeleur | 1:00:39 | 2 | |
|
2022-01-17 | A hackers view to the upcoming ISO SAE 21434 Martin Schmiedecker | 41:48 | 28 | |
|
2022-01-17 | Weaknesses in WPA3's Dragonfly Handshake Mathy Vanhoef | 1:01:04 | 12 | |
|
2022-01-17 | Human side channels and their implications for security and privacy | 49:50 | 2 | |
|
2022-01-17 | Catching WMI lateral movement in an enterprise network Jaco Blokker | 42:40 | 8 | |
|
2022-01-17 | Social engineering for penetration testers Sharon Conheady | 1:02:24 | 13 | |
|
2022-01-17 | The 99c heart surgeon dilemma Stefan Friedli | 47:26 | 3 | |
|
2022-01-17 | Hacking driverless vehicles ZoZ | 1:07:15 | 0 | |
|
2022-01-17 | ReInvestigating Powershell attacks Matt Hastings and Ryan Kazanciyan | 1:00:29 | 1 | |
|
2022-01-17 | Shaving the beard | 27:22 | 0 | |
|
2022-01-17 | Forging Trusts for Deception in Active Directory Nikhil Mittal | 57:10 | 4 | |
|
2022-01-17 | Process Control through Counterfeit Comms Jared Rittle | 35:00 | 2 | |
|
2022-01-17 | $SignaturesAreDead = Long Live RESILIENT Signatures wide ascii nocase | 56:32 | 0 | |
|
2022-01-17 | Finding 0days in embedded systems with code coverage guided fuzzing | 58:04 | 22 | Guide |
|
2022-01-17 | oT RCE, a Study With Disney Lilith Wyatt | 51:02 | 1 | |
|
2022-01-17 | BruCON Retro Opening | 31:41 | 2 | |
|
2022-01-17 | Dissecting Of Non Malicious Artifacts One IP At A Time Dani Goland & Ido Naor | 16:16 | 0 | |
|
2022-01-17 | BruCON Opening | 4:10 | 4 | |
|
2022-01-17 | When Lemon Markets, Imposter Syndrome & Dunning Kruger collide Haroon Meer | 58:13 | 8 | |
|
2022-01-17 | All Your Cloud Are Belong To Us Hunting Compromise in Azure Nate Warfield | 59:14 | 2 | |
|
2022-01-17 | Levelling Up Security @ Riot Games Mark Hillick | 56:51 | 12 | |
|
2022-01-17 | Using blue team techniques in red team ops Mark Bergman & Marc Smeets | 50:11 | 14 | |
|
2022-01-17 | Hunting Android Malware A novel runtime technique for identifying applications | 34:48 | 4 | |
|
2022-01-17 | Advanced WiFi Attacks using Commodity Hardware Mathy Vanhoef | 56:28 | 23 | |
|
2022-01-17 | Secure channels Building real world crypto systems Sander Demeester | 1:01:40 | 2 | |
|
2022-01-17 | An overview of the CMS brute forcing malware landscape Anna Shirokova | 38:40 | 1 | |
|
2022-01-17 | From Weakest Link to Retaliation Weapon Vlad Styran | 41:04 | 0 | |
|
2022-01-17 | A market solution for product safety and corporate governance Justine Bone | 36:22 | 0 | |
|
2022-01-17 | Open Soure Security Orchestration Gregory Pickett | 37:35 | 3 | |
|
2022-01-17 | Evading Microsoft ATA for Active Directory Domination Nikhil Mittal | 49:57 | 3 | |
|
2022-01-17 | DYODE Arnaud Soullié | 40:51 | 13 | |
|
2022-01-17 | XFLTReaT a new dimension in tunnelling Balazs Bucsay | 52:17 | 2 | |
|
2022-01-17 | How hackers changed the security industry Chris Wysopal | 46:33 | 1 | |
|
2022-01-17 | Detecting malware even when it is encrypted František Střasák | 43:36 | 2 | |
|
2022-01-17 | Weaponizing the BBC Micro Bit Damien Cauquil | 47:41 | 4 | |
|
2022-01-17 | Hacking invisibly and silently with light and sound Matt Wixey | 51:06 | 23 | |
|
2022-01-17 | Browser Exploits Grab them by the… collar Debasish Mandal | 58:24 | 4 | |
|
2022-01-17 | Esoteric Web Application Vulnerabilities Andres Riancho | 51:40 | 2 | |
|
2022-01-17 | Invoke obfuscation powershell obfusk8tion techniques DanielBohannon | 59:15 | 37 | |
|
2022-01-17 | Security Through Design Jelle Niemantsverdriet | 40:47 | 5 | |
|
2022-01-17 | Hacking KPN Lessons From The Trenches Jeremy Goldstein & Bouke Van Laethem | 48:16 | 9 | |
|
2022-01-17 | Smart Sheriff, Dumb Idea Abraham Aranguren & Fabian Fässler | 51:29 | 52 | |
|
2022-01-17 | Keynote Inventing Defense Allison Miller | 49:23 | 8 | |
|
2022-01-17 | Ant Forensics AF Dual Core | 51:28 | 1 | |
|
2022-01-17 | Virtual Terminals, POS Security And Becoming A Grigorios Fragkos | 49:50 | 16 | |
|
2022-01-17 | Keynote The Birth Of A Discipline Corey Schou | 48:15 | 4 | |
|
2022-01-17 | Building A Successful Internal Adversarial Simulation Team C Gates & C Nickerson | 56:47 | 0 | |
|
2022-01-17 | What Does The Perfect Door Or Padlock Look Like Deviant Ollam | 48:26 | 17 | |
|
2022-01-17 | New Adventures In Active Defense, Offensive… John Strand | 54:37 | 18 | |
|
2022-01-17 | Scraping Leaky Browsers for fun and Passwords Stefaan Truijen Adrian Toma | 41:05 | 1 | |
|
2022-01-17 | Decepticon R Nandedkar Amrita Iyer Krishnakant Patil | 31:01 | 1 | |
|
2022-01-17 | Hello To The Dark Side L Grecs | 58:15 | 0 | |
|
2022-01-16 | Nightmares of a Pentester Chris Nickerson | 1:10:13 | 11 | |
|
2022-01-16 | Brain Waves Surfing InSecurity in EEG Technologies Alejandro Hernandez | 54:02 | 3 | Vlog |
|
2022-01-16 | The 11 Veil, Camouflage & Covert Invisible WiFi, Revealed R Nandedkar & A Iyer | 44:59 | 2 | |
|
2022-01-16 | Levelling Up Security @ Riot Games Mark Hillick | 1:16:24 | 10 | |
|
2022-01-16 | Keynote Looking Forward Finding the right balance for INFOSEC David Kennedy | 52:58 | 7 | |
|
2022-01-16 | Hacking as Practice for Transplanetary Life in the 21st Century Richard Thieme | 55:27 | 8 | |
|
2022-01-16 | Shims For The Win Willi Ballenthin & Jon Tomczak | 57:10 | 1 | |
|
2022-01-16 | OSXCollector Automated forensic evidence collection & analysis for OS X Kuba Sendor | 30:46 | 9 | |
|
2022-01-16 | Advanced WiFi Attacks using Commodity Hardware Mathy Vanhoef | 50:07 | 13 | |
|
2022-01-16 | Unified DNS View to Track Threats Dhia Mahjoub & Thomas Mathew | 51:59 | 10 | |
|
2022-01-16 | SSO It s the SAML SAML Situation David Mortman | 44:10 | 2 | |
|
2022-01-16 | Desired state compromised Ryan Kazanciyan & Matt Hastings | 37:35 | 2 | |
|
2022-01-16 | CVE Search Alexandre Dulaunoy & Pieter Jan Moreels | 38:02 | 21 | |
|
2022-01-16 | Keynote What BASE Jumping Taught Me about Risk Shyama Rose | 42:29 | 58 | |
|
2022-01-16 | Creating REAL Threat Intelligence with Evernote L Grecs | 57:32 | 15 | |
|
2022-01-16 | The project of prototype this Joe Grand & Zoz | 1:09:20 | 7 | |
|