Presentation | Speaker | Slides | ||
---|---|---|---|---|
Hacking Humans |
Barnaby Jack |
Not available |
||
iOS6 Security |
Mark Dowd |
|||
Modeling the exploitation and mitigation of memory safety vulns |
Matt Miller |
|||
Advanced Exploitation of Mobile/Embedded Devices:the ARM Microprocessor |
Stephen Ridley & Stephen Lawler |
|||
Binary Instrumentation For Android |
Collin Mulliner |
|||
Radium: Auto Data Collection & Visualization in Maltego |
Roelof Temmingh |
Not available |
||
Emulating DFU to Quickly Reverse and Exploit USB Devices |
Travis Goodspeed |
|||
Detecting Bugs Using Decompilation and Dataflow Analysis |
Silvio Cesare |
|||
Maverick: Adding the Apple Touch to Qualcomm's Baseband Bootrom |
Eric McDonald (MuscleNerd) |
Not available |
||
Tackling the Android Challenge |
Joshua Drake |
|||
Unravelling Windows 8 Security and the ARM Kernel |
Alex Ionescu |
|||
Rootkit in your Laptop: Hidden Code in your Chipset |
Igor Skochinsky |
|||
The Case for Semantics-Based Methods in Reverse Engineering |
Rolf Rolles |
|||
Android Forensic Deep Dive |
Bradley Schatz |