Las lista de las diapositivas es la siguiente:
- D1 KEYNOTE – Andy Ellis – Cognitive Injection.pdf
- D1T1 – Collin Mulliner – Android DDI – Dynamic Dalvik Instrumentation of Android Applications.pdf
- D1T1 – Dominic Chell and Shaun Colley – Practical Attacks Against Encrypted VoIP Communications.pdf
- D1T1 – Gianni Gnesa – Hacking Corporations Using Unconventional Chained Exploits.pdf
- D1T1 – Kallenberg, Kovah, Butterworth – Defeating Signed BIOS Enforcement.pdf
- D1T1 – Marco Balduzzi, Kyle Wilhoit Alessandro Pasta – Attacking Vessel Tracking Systems for Fun and Profit.pdf
- D1T1 – Peter ‘bl4sty’ Geissler – Demystifying Game Console Security.pdf
- D1T2 – Adam Laurie – RFIDler – Software Defined RFID Reader Writer Emulator.pdf
- D1T2 – Andy Davis – Deriving Intelligence from USB Stack Interactions.pdf
- D1T2 – Francisco – Owning a Cisco VoIP Environment.pdf
- D1T2 – Joaquim Espinhara and Ulisses Alburquerque – Using Online Activity as Digital DNA.pdf
- D1T2 – Mariano Graziano and Andrea Lanzi – How Actaeon Unveils Your Hypervisor.pdf
- D1T2 – Mathias Morbitzer – TCP Idle Scans in IPv6.pdf
- D1T3 – Cem Gurkok – Hunting for OS X Rootkits in Memory.pdf
- D1T3 – Mike Shema – CSRF Lab.pdf
- D1T3 – Wes Brown – Malware Analysis Using Visualization.pdf
- D1T3 BONUS TALK – Marc Rogers – Why I Hacked TouchID and Still Think It’s Awesome.pdf
- D2 KEYNOTE – Joe Sullivan – Bringing Social to Security – NO SLIDES.pdf
- D2T1 – Cyril ‘pod2g’ Cattiaux and GG – How Apple Can Read Your iMessages.pdf
- D2T1 – Hugo Teso – Digging Deeper Into Aviation Security.pdf
- D2T1 – James Forshaw – Exploiting XML Digital Signature Implementations.pdf
- D2T1 – Joshua ‘p0sixninja’ Hill – SHAttered Dreams.pdf
- D2T1 – Mark Vincent Yason – Diving Into IE10′s Enhanced Protected Mode Sandbox.pdf
- D2T2 – Rahul Sasi – Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis.pdf
- D2T2 – Stefan Esser – Tales from iOS 6 Exploitation and iOS 7 Security Changes.pdf
- D2T2 – Stefano Zanero – Tracking and Characterizing Botnets Using Automatically Generated Domains.pdf
- D2T2 – Victor van der Veen – A Fast and Complete Android Method Tracer.pdf
- D2T2 – Vladimir Katalov – Cracking and Analyzing Apple’s iCloud Protocol.pdf
- D2T3 – Ashar Javad – Trusted Friend Attack.pdf
- D2T3 – Eric Michaud and Ryan Lackey – Thwarting Evil Maid Attacks.pdf
- D2T3 – Job de Haas – 20 Ways Past Secure Boot.pdf
- D2T3 – Keith Lee and Jonathan Werrett – Facebook OSINT.pdf
- D2T3 – Luiz Eduardo and Joaquim Espinhara – Lost in Translation.pdf
Fuente: CyberHades
0 comentarios:
Publicar un comentario