2022-01-01 | Keynote Gen Alexander | 53:36 | 1 | |
|
2022-01-01 | Million Browser Botnet | 48:30 | 9 | |
|
2022-01-01 | Lawful Access Panel | 58:39 | 4 | |
|
2022-01-01 | End to end Analysis of Domain Generating Algorithm Malware Family | 53:44 | 137 | |
|
2022-01-01 | BlackberryOS 10 From a Security Perspective | 52:09 | 1 | |
|
2022-01-01 | Mobile Malware Why the Traditional AV Paradigm is Doomed | 25:16 | 0 | |
|
2022-01-01 | Multiplexed Wired Attack Surfaces | 1:01:46 | 3 | |
|
2022-01-01 | Energy Fraud and Orchestrated Blackouts Issues with Wireless Metering Protocols | 44:15 | 2 | |
|
2022-01-01 | Hacking Like in the Movies Visualizing Page Tables for Local Exploitation | 55:53 | 1 | |
|
2022-01-01 | Black box Assessment of Pseudorandom Algorithms | 52:47 | 3 | |
|
2022-01-01 | Evading Deep Inspection for Fun and Shell | 45:22 | 0 | |
|
2022-01-01 | New Trends in FastFlux Networks | 22:23 | 4 | |
|
2022-01-01 | BlackHat 2013 Combating the Insider Threat at the FBI Real world Lessons Learned | 59:41 | 3 | |
|
2022-01-01 | Hacking, Surveilling, and Deceiving victims on Smart TV | 52:36 | 21 | |
|
2022-01-01 | OPSEC Failures of Spies | 25:11 | 9 | |
|
2022-01-01 | Exploiting Network Surveillance Cameras Like a Hollywood Hacker | 33:37 | 6 | |
|
2022-01-01 | Hiding @ Depth Exploring, Subverting, and Breaking NAND Flash Memory | 32:27 | 8 | |
|
2022-01-01 | OptiROP The Art of Hunting ROP Gadgets | 1:06:35 | 1 | |
|
2022-01-01 | Bochspwn Identifying 0 Days via System Wide Memory Access Pattern Analysis | 55:58 | 0 | |
|
2022-01-01 | Fact and Fiction Defending Medical Device | 47:57 | 1 | |
|
2022-01-01 | Home Invasion v2 0 Attacking Network Controlled Hardware | 53:09 | 4 | |
|
2022-01-01 | Fully Arbitrary 802 3 Packet Injection Maximizing Ethernet Attack Surface | 53:10 | 5 | |
|
2022-01-01 | Out of Control Demonstrating SCADA Device Exploitation | 37:30 | 7 | |
|
2022-01-01 | Buying into the Bias Why Vulnerability Statistics Suck | 56:52 | 3 | |
|
2022-01-01 | Honey, I m Home Hacking Z Wave Home Automation Systems | 56:09 | 25 | |
|
2022-01-01 | Owning the Routing Table Part II | 40:51 | 1 | |
|
2022-01-01 | Funderbolt Adventures in Thunderbolt DMA Attacks | 57:13 | 7 | |
|
2022-01-01 | Clickjacking Revisted A Perceptual View of UI Security | 22:35 | 2 | |
|
2022-01-01 | Hot Knives Through Butter Bypassing Automated Analysis Systems | 32:43 | 0 | |
|
2022-01-01 | Pass the Hash and other credential theft and reuse Preventing Lateral Movement | 39:59 | 0 | |
|
2022-01-01 | CMX IEEE Clean File Metadata Exchange | 26:29 | 2 | |
|
2022-01-01 | How to Build a SpyPhone | 45:55 | 0 | Guide |
|
2022-01-01 | Compromising Industrial Facilities from 40 Miles Away | 44:08 | 5 | |
|
2022-01-01 | A Tale of One Software Bypass of Windows 8 Secure Boot | 49:06 | 14 | |
|
2022-01-01 | Legal Considerations for Cellular Research | 25:22 | 0 | |
|
2022-01-01 | Let s Get Physical Breaking Home Security Systems and Bypassing Building Controls | 49:02 | 2 | |
|
2022-01-01 | CreepyDOL Cheap, Distributed Stalking | 54:13 | 2 | |
|
2022-01-01 | How to grow a TREE Taint Enabled Reverse Engineering Environment from a CBASS | 55:45 | 2 | Guide |
|
2022-01-01 | Above My Pay Grade Cyber Response at the National Level | 56:10 | 0 | |
|
2022-01-01 | Mactans Injecting Malware Into iOS Devices via Malicious Chargers | 48:52 | 9 | |
|
2022-01-01 | CrowdSource Open Source Crowd Trained Machine Learning Model for Malware Detection | 28:36 | 8 | |
|
2022-01-01 | Hunting the Shadows In Depth Analysis of Escalated APT Attacks | 57:35 | 2 | |
|
2022-01-01 | Abusing Web APIs Through Scripted Android Applications | 29:52 | 0 | |
|
2022-01-01 | Defending Networks With Incomplete Information A Machine Learning Approach | 56:41 | 0 | Guide |
|
2022-01-01 | Mainframes The Past Will Come to Haunt You | 59:26 | 5 | |
|
2022-01-01 | Android One Root to Own them All | 59:52 | 1 | |
|
2022-01-01 | I Can Hear You Now Traffic Interception and Remote Mobile Phone Cloning | 45:51 | 5 | |
|
2022-01-01 | Denial of Service as a Service Asymmetrical Warfare at its Finest | 16:36 | 2 | |
|
2022-01-01 | Malicious File for Exploiting Forensic Software | 22:34 | 2 | |
|
2022-01-01 | Beyond the Application Cellular Privacy Regulatory Space | 19:47 | 0 | |
|
2022-01-01 | Denying Service to DDoS Protection Services | 24:27 | 3 | |
|
2022-01-01 | Java Every Days Exploiting Software Running on Three Billion Devices | 52:07 | 4 | |
|
2022-01-01 | Maltego Tungsten As a Collaborative Attack Platform | 1:09:20 | 4 | |
|
2022-01-01 | Big Data for Web Application Security | 20:21 | 0 | |
|
2022-01-01 | Detecting Vulnerabilities in Virtual Devices with Conformance Testing | 18:59 | 0 | |
|
2022-01-01 | BinaryPig Scalable Malware Analytics in Hadoop | 48:11 | 0 | |
|
2022-01-01 | Javascript Static Security Analysis Made Easy with JSPrime | 1:00:12 | 5 | |
|
2022-01-01 | Just In Time Code Reuse The More Things Change, the More They Stay the Same | 56:39 | 0 | |
|
2021-12-31 | Hacking for Fun & Profit | 56:02 | 0 | |
|
2021-12-31 | Web Exploit Toolkits | 41:39 | 4 | |
|
2021-12-31 | Secure Browser Plugins | 58:12 | 4 | |
|
2021-12-31 | Bouncer Land | 57:08 | 2 | |
|
2021-12-31 | Trust, Security and Society Presented By Bruce Schneier | 56:15 | 21 | |
|
2021-12-31 | Ghost in the Air Traffic | 1:00:13 | 13 | |
|
2021-12-31 | Random Number Generator in PHP | 59:25 | 11 | |
|
2021-12-31 | BlackOps | 55:18 | 0 | |
|
2021-12-31 | We have you by the Gadgets | 39:24 | 2 | |
|
2021-12-31 | Torturing OpenSSL | 54:07 | 2 | |
|
2021-12-31 | Probing The Mobile Operating Networks | 54:21 | 1 | Guide |
|
2021-12-31 | Find Me in your Database | 38:02 | 0 | |
|
2021-12-31 | Digging Deep into the Flash Sandboxes | 45:55 | 2 | |
|
2021-12-31 | The Big Picture | 1:01:49 | 1 | |
|
2021-12-31 | SQL Injections | 45:18 | 0 | |
|
2021-12-31 | File Disinfection Framework Striking back at the Polymorphic Viruses | 1:00:29 | 1 | |
|
2021-12-31 | Easy Local Windows Kernel Exploitation | 36:33 | 68 | |
|
2021-12-31 | Blended Threats and JavaScript: a plan for permanent network compromise | 51:42 | 6 | |
|
2021-12-31 | The Info Leak Era Software Exploitation | 50:46 | 5 | |
|
2021-12-31 | How many bricks does it take to Crack a Microcell? | 50:11 | 3 | |
|
2021-12-31 | Windows 7 Phone Hacking & Exploitation | 43:56 | 3 | |
|
2021-12-31 | The Christopher Columbus Rule and DHS | 41:20 | 1 | |
|
2021-12-31 | Web Tracking for You | 56:01 | 1 | |
|
2021-12-31 | Smashing the Furure for Fun & Profit Presented By:Jeff Moss Bruce Schneier Adam Shostack | 56:02 | 3 | |
|
2021-12-31 | Recent Java Exploitation Trends and Malware | 55:25 | 16 | |
|
2021-12-31 | Are you my type? : Breaking NET Sandboxes through serialization | 44:51 | 1 | |
|
2021-12-31 | Changing the Security Paradigm... Taking back your network and bringing pain to the adversary | 1:00:11 | 0 | |
|
2021-12-30 | There's a party at ring0 Tavis Ormandy, Julien Tinnes | 1:09:55 | 61 | |
|
2021-12-30 | Ushering in the post GRC world applied threat modeling Alex Hutton, Allison Miller | 1:09:19 | 4 | |
|
2021-12-30 | USB Paul carugati | 24:08 | 7 | |
|
2021-12-30 | The future of DNS Security Panel | 1:04:20 | 2 | |
|
2021-12-30 | CuteCats exe and the Arab Spring | 1:00:40 | 4 | |
|
2021-12-30 | Hacking the Corporare Mind: using social engineering tactics to improve organizational security | 52:41 | 2 | Guide |
|
2021-12-30 | Legal Aspects of Cyberspace Operations | 1:01:40 | 5 | |
|
2021-12-30 | Meeting Yaniv Karta | 2:59 | 4 | |
|
2021-12-30 | A stitch in time saves nine: A Case of Multiple Operation System Vurnarability | 58:34 | 1 | |
|
2021-12-30 | Hacking with WebSockets | 53:07 | 195 | |
|
2021-12-30 | Dex Education: Practicing safe Dex | 43:54 | 7 | |
|
2021-12-30 | Dont stand so close to me: an analysis of the NFC attack surface | 54:22 | 7 | Guide |
|
2021-12-30 | Looking into the Eye of the Meter | 1:00:22 | 2 | |
|
2021-12-30 | Errata Hits Puberty: 13 years of chagrin | 1:03:18 | 2 | |
|
2021-12-30 | Hardware Backdooring is practical | 57:49 | 10 | |
|