| Presentation | Speaker | Slides | ||
|---|---|---|---|---|
|
Hacking Humans |
Barnaby Jack |
|
Not available |
|
|
iOS6 Security |
Mark Dowd |
|
||
|
Modeling the exploitation and mitigation of memory safety vulns |
Matt Miller |
|
||
|
Advanced Exploitation of Mobile/Embedded Devices:the ARM Microprocessor |
Stephen Ridley & Stephen Lawler |
|
||
|
Binary Instrumentation For Android |
Collin Mulliner |
|
||
|
Radium: Auto Data Collection & Visualization in Maltego |
Roelof Temmingh |
|
Not available |
|
|
Emulating DFU to Quickly Reverse and Exploit USB Devices |
Travis Goodspeed |
|
||
|
Detecting Bugs Using Decompilation and Dataflow Analysis |
Silvio Cesare |
|
||
|
Maverick: Adding the Apple Touch to Qualcomm's Baseband Bootrom |
Eric McDonald (MuscleNerd) |
|
Not available |
|
|
Tackling the Android Challenge |
Joshua Drake |
|
||
|
Unravelling Windows 8 Security and the ARM Kernel |
Alex Ionescu |
|
||
|
Rootkit in your Laptop: Hidden Code in your Chipset |
Igor Skochinsky |
|
||
|
The Case for Semantics-Based Methods in Reverse Engineering |
Rolf Rolles |
|
||
|
Android Forensic Deep Dive |
Bradley Schatz |
|