Title |
Speakers |
Conference |
Tags |
DIGGING DEEP INTO THE FLASH SANDBOXES |
Paul Vincent Sabanal
,
Mark Vincent Yason
|
BlackHat USA-2012 - Las Vegas, USA |
Deep Knowledge
Flash
Architecture
|
WINDOWS 8 HEAP INTERNALS |
Chris Valasek
,
Tarjei Mandt
|
BlackHat USA-2012 - Las Vegas, USA |
Deep Knowledge
Exploitation
Windows 8
Heap Overflows
|
FILE DISINFECTION FRAMEWORK: STRIKING BACK AT POLYMORPHIC VIRUSES |
Mario Vuksan
,
Tomislav Pericin
|
BlackHat USA-2012 - Las Vegas, USA |
Deep Knowledge
Anti-Virus
|
A Crumple Zone For Service Oriented Architectures |
Andrew Gronosky
|
OWASP BASC-2010 - Boston, USA |
Mobile Security
Others
Deep Knowledge
|
Owasp Basics 1 And 2 |
Rob Cheyne
|
OWASP BASC-2010 - Boston, USA |
Security
Web
Others
Deep Knowledge
Analysis
|
Some Experiences And Advices For The Security Community Of Japan |
Vangelis
|
PacSec-2010 - Tokyo, Japan |
Security
Deep Knowledge
Community
|
Emerging Security Threats |
Simple Nomad
|
Security B-Sides DFW-2010 - USA |
Security
Others
Deep Knowledge
|
Infosec Sheepdogs: Creating An Abstraction/Translation |
Nick Selby
|
Security B-Sides DFW-2010 - USA |
Security
Others
Deep Knowledge
Community
Law Enforcement
|
The Mistakes Qsas Make |
Branden R. Williams
|
Security B-Sides DFW-2010 - USA |
Security
Others
Deep Knowledge
|
Life As A Security Sales Engineer/Solutions Architect |
Eric Irvin
|
Security B-Sides DFW-2010 - USA |
Security
Deep Knowledge
|
Frozencache |
Jürgen Pabel
|
hashdays-2010 - Lucerne, Switzerland |
Security
Others
Deep Knowledge
|
Security Practitioners: Winning Friends And Influencing People |
Josh Sokol
|
House Con-2010 - USA |
Security
Others
Deep Knowledge
|
Lunatic Fringe - Stories From The Leading Edge Of Web Application Security |
Bill Pennington
|
House Con-2010 - USA |
Security
Others
Deep Knowledge
|
Top 5 Information Security Threats |
Paulwilliams Williams
|
House Con-2010 - USA |
Others
Deep Knowledge
|
Website Security Statistics (2010) - Industry Bechmarks |
Jeremiah Grossman
|
House Con-2010 - USA |
Security
Others
Deep Knowledge
|
Security In The Sdlc: It Doesn'T Have To Be Painful! |
Matt Bartoldus
|
SOURCE Barcelona-2010 - Barcelona, Spain |
Security
Others
Deep Knowledge
|
Carders.Cc, The Rise And Fall Of An Underground Forum |
Vicente Diaz
,
David Barroso
|
SOURCE Barcelona-2010 - Barcelona, Spain |
Security
Others
Deep Knowledge
|
Everything Useful I Learned About Software Security, I Learned At Microsoft! |
Michael Howard
|
LASCON-2010 - Austin, USA |
Security
Others
Deep Knowledge
Development
|
Owasp Top 10: What Is It All About? |
Dean Bushmiller
|
LASCON-2010 - Austin, USA |
Security
Others
Deep Knowledge
|
From Russia With…An Insight On Intelligence Analysis Of Eastern Hacker Culture |
Fyodor Yarochkin
|
BlueHat-2010 - Redmond, USA |
Security
Deep Knowledge
|
A Brief History Of Attacks Against Ios And Android |
Charlie Miller
|
BlueHat-2010 - Redmond, USA |
Deep Knowledge
|
Fig Leaf Security |
Haroon Meer
|
ZaCon-2 - Johannesburg, South Africa |
Security
Others
Deep Knowledge
Risk
|
Building A Sec Community |
Ollie Whitehouse
|
ZaCon-2 - Johannesburg, South Africa |
Security
Others
Deep Knowledge
Community
|
Something About Tea |
Roelof ( RT ) Temmingh
|
ZaCon-2 - Johannesburg, South Africa |
Security
Others
Deep Knowledge
|
Conficker: ~687 Days Later |
Barry Irwin
|
ZaCon-2 - Johannesburg, South Africa |
Security
Deep Knowledge
|
Top 5 Ways To Steal A Company |
Chris Nickerson
|
BruCON-2010 - Brussels, Belgium |
Security
Others
Deep Knowledge
Exploitation
|
Head Hacking – The Magic Of Suggestion And Perception |
Dale Pearson
|
BruCON-2010 - Brussels, Belgium |
Others
Deep Knowledge
Social Engineering
|
Cyber [Crime|War] - Connecting The Dots |
Ian Amit
|
BruCON-2010 - Brussels, Belgium |
Security
Deep Knowledge
Intrusion Detection
Incident Response
Privacy
|
Cert Polska – Working As A National Level Computer Security Incident Response Team (Csirt) |
Piotr Kijewski
|
CyberSec -2010 - Brussels, Belgium |
Security
Others
Deep Knowledge
Incident Response
Computer Forensics
|
Cyber Attacks: The Insider Threat |
Geoff Harris
|
CyberSec -2010 - Brussels, Belgium |
Security
Others
Deep Knowledge
|
Evolutionary Synthesis Of Collective Behavior |
David Kriesel
|
CollSec-2010 - Washington DC, USA |
Security
Others
Deep Knowledge
|
The Ramblings Of An Ex-Qsa |
Deancarter Carter
|
OWASP New Zealand-2010 - New Zealand |
Security
Deep Knowledge
Compliance
|
Insomnia Security - Don'T Try This At Home |
Brett Moore
|
OWASP New Zealand-2010 - New Zealand |
Security
Deep Knowledge
|
Introducing Kane Box |
John Flowers
|
HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands |
Security
Deep Knowledge
Hardware General
|
The Traveling Hacksmith 2009-2010 |
Saumil Shah
|
HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands |
Security
Others
Deep Knowledge
|
Organizing Ninjas: A How To For Better Team Pentesting |
Jonathan Cran
|
Security B-Sides Las Vegas-2009 - Las Vegas, USA |
Security
Others
Deep Knowledge
|
An Inside Look At The Ever Evolving Rogue Antivirus Economy |
Luis Corrons
|
Security B-Sides Las Vegas-2009 - Las Vegas, USA |
Deep Knowledge
Application Security
|
Catching The Unicorn: A Technical Exploration Of Why Nac Is Failing |
Jennifer Jabbusch
|
Security B-Sides Las Vegas-2009 - Las Vegas, USA |
Security
Others
Deep Knowledge
|
Can Risk Management Be Science? Challenging The Epistemological Anarchist To Escape Our Dark Age |
David Mortman
,
Alex Hutton
|
Security B-Sides Las Vegas-2009 - Las Vegas, USA |
Security
Others
Deep Knowledge
|
Feathers Will Fly Panel! - Professional Image And Gender Issues For Women In Security |
Leigh ( Hypatiadotca ) Honeywell
,
Erin Jacobs
,
Stacy Thayer
,
Leigh Hollowell
,
Nicolleneulist Neulist
,
Magen Hughes
|
Security B-Sides Las Vegas-2009 - Las Vegas, USA |
Security
Others
Deep Knowledge
|
Warvox |
H.d. Moore
|
Security B-Sides Las Vegas-2009 - Las Vegas, USA |
Security
Others
Deep Knowledge
|
Deconstructing Coldfusion |
Chris Eng
|
OWASP Appsec-2010 - Stocholm, Sweden |
Security
Others
Deep Knowledge
Exploitation
Risk
|
Hacking By Numbers |
Tom Brennan
|
OWASP Appsec-2010 - Stocholm, Sweden |
Security
Others
Deep Knowledge
|
Five Years Of Persistent Targeted Attacks |
Maarten Van horenbeeck
,
Bruce Dang
|
CCDCOE-2010 - Estonia |
Security
Deep Knowledge
|
The Good, The Bad, And The Ridiculous In Pen Testing |
Vinnie Liu
,
Stach Liu
|
SANS Pen Test Summit-2010 - Baltimore, USA |
Security
Others
Deep Knowledge
|
Security Outliers: Cultural Cues From High-Risk Professions |
Gal Shpantzer
|
Security B-Sides Boston-2010 - Boston, USA |
Security
Deep Knowledge
|
I Can'T Make This Sh!T Up! - War Stories From A Former And Award Winning Cso |
Erin Jacobs
|
Security B-Sides Boston-2010 - Boston, USA |
Others
Deep Knowledge
|
Tastes Great Vs Less Filling: Deconstructing Risk Management (A Practical Approach Towards Decision Making) |
Mike Dahn
|
Security B-Sides Boston-2010 - Boston, USA |
Others
Deep Knowledge
|
Enterprise Portals - Gateway To The Gold |
Ian De Villiers
|
ZaCon-1 - Johannesburg, South Africa |
Security
Others
Deep Knowledge
|
Make Tea Not War |
Roelof ( RT ) Temmingh
|
ZaCon-1 - Johannesburg, South Africa |
Security
Others
Deep Knowledge
|
Why Zacon? |
Haroon Meer
|
ZaCon-1 - Johannesburg, South Africa |
Security
Others
Deep Knowledge
|
The Mechanics Of Ddos |
Ralfe Poisson
|
ZaCon-1 - Johannesburg, South Africa |
Security
Others
Deep Knowledge
Analysis
|
A Future Security Landscape |
Anthony Olivier
|
ZaCon-1 - Johannesburg, South Africa |
Security
Others
Deep Knowledge
|
The Entrepreneur'S Guide To Career Management |
Lee Kushner
|
OWASP Appsec-2009 - Washington DC, USA |
Security
Deep Knowledge
|
The 10 Least-Likely And Most Dangerous People On The Internet |
Robert Hansen
|
OWASP Appsec-2009 - Washington DC, USA |
Security
Deep Knowledge
|
Practical Experience With The Secure Software Lifecycle |
Bruce Sams
|
OWASP Appsec-2009 - Germany |
Security
Deep Knowledge
Application Security
Development
|
Javascript From Hell - Advanced Client-Side Injection Techniques Of Tomorrow |
Mario Heiderich
|
OWASP Appsec-2009 - Germany |
Security
Deep Knowledge
Network Penetration
SQL
|
Red And Tiger Team |
Chris Nickerson
|
BruCON-2009 - Brussels, Belgium |
Mobile Security
Security
Others
Deep Knowledge
Application Security
Monitoring
Social Engineering
Reverse Engineering
Network Penetration
Physical Pentesting
|
Syscall Proxying - Simulating Remote Execution |
Maximiliano Caceres
|
Blackhat USA-2002 - Las Vegas, USA |
Deep Knowledge
Security
|
Professional Source Code Auditing |
Thomas ( Halvar Flake ) Dullien
,
Mark Dowd
,
Nishad Herath
,
Neil Mehta
,
Chris Spencer
|
Blackhat USA-2002 - Las Vegas, USA |
Security
Deep Knowledge
|
Graph-Based Binary Analysis |
Thomas ( Halvar Flake ) Dullien
|
Blackhat USA-2002 - Las Vegas, USA |
Security
Deep Knowledge
|
Dc Phone Home |
Christopher Davis
,
Aaron Higbee
|
Blackhat USA-2002 - Las Vegas, USA |
Security
Deep Knowledge
|
Black Ops Of Tcp/Ip: Spliced Nat2Nat And Other Packet-Level Misadventures |
|
Blackhat USA-2002 - Las Vegas, USA |
Deep Knowledge
Security
|