Presentation | Speaker | Slides | ||
---|---|---|---|---|
Hacking Humans |
Barnaby Jack |
![]() |
Not available |
|
iOS6 Security |
Mark Dowd |
![]() |
||
Modeling the exploitation and mitigation of memory safety vulns |
Matt Miller |
![]() |
||
Advanced Exploitation of Mobile/Embedded Devices:the ARM Microprocessor |
Stephen Ridley & Stephen Lawler |
![]() |
||
Binary Instrumentation For Android |
Collin Mulliner |
![]() |
||
Radium: Auto Data Collection & Visualization in Maltego |
Roelof Temmingh |
![]() |
Not available |
|
Emulating DFU to Quickly Reverse and Exploit USB Devices |
Travis Goodspeed |
![]() |
||
Detecting Bugs Using Decompilation and Dataflow Analysis |
Silvio Cesare |
![]() |
||
Maverick: Adding the Apple Touch to Qualcomm's Baseband Bootrom |
Eric McDonald (MuscleNerd) |
![]() |
Not available |
|
Tackling the Android Challenge |
Joshua Drake |
![]() |
||
Unravelling Windows 8 Security and the ARM Kernel |
Alex Ionescu |
![]() |
||
Rootkit in your Laptop: Hidden Code in your Chipset |
Igor Skochinsky |
![]() |
||
The Case for Semantics-Based Methods in Reverse Engineering |
Rolf Rolles |
![]() |
||
Android Forensic Deep Dive |
Bradley Schatz |
![]() |