Access

Title Speakers Conference Tags
Usb Autorun Attacks Against Linux Jon Larimer ShmooCon-2011 - Washington DC, USA Security Access Exploitation Malware
Identity And Access Management - Get Your User-Accesses Under Control! Rik Van bruggen hashdays-2010 - Lucerne, Switzerland Access Control Access
Iphone Security Model And Vulnerabilities Cedric Halbronn HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Security Web Access Exploitation Analysis Browser
Smartphones, Applications & Security Paul Sebastian Ziegler HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Security Access Malware
Snmp - Simple Network Mediated (Cisco) Pwnage Georg Christian Pranschke ZaCon-2 - Johannesburg, South Africa Security Infrastructure Access Network Penetration
Detecting Backdoors With Network Trickery Simeon Miteff ZaCon-2 - Johannesburg, South Africa Security Infrastructure Firewall Access
(Too Much) Access Points - Exploitation Roundup Cristofaro Mune SyScan-2010 - Taipei, Taiwan Security Access Exploitation
Baaz: A System For Detecting Access Control Misconfigurations Tathagata Das , Ranjita Bhagwan , Prasad Naldurg 19th USENIX Security Symposium-2010 - Washington DC, USA Security Access
Proving Voltaire Right: Security Blunders Dumber Than Dog Snot Roger G. Johnston 19th USENIX Security Symposium-2010 - Washington DC, USA Security Access
Security That Is Meant To Be Skin Deep: Using Ultraviolet Micropigmentation To Store Emergency-Access Keys For Implantable Medical Devices Stuart Schechter HealthSec-2010 - Washington DC, USA Security Access Analysis
Fine-Grained Sharing Of Health Records Using Xspa Profile For Xacml—An Extended Abstract A. Al-fares , B. Yu , K. Moidu , Angelos Stavrou , Duminda Wijesekera , Anoop Singhal HealthSec-2010 - Washington DC, USA Security Access Control Access Privacy
We Don'T Need No Stinkin' Badges: Hacking Electronic Door Access Controllers Shawn Merdinger DEF CON-18 - Las Vegas, USA Security Access
Exploiting The Forest With Trees Meredith L. Patterson , Len Sassaman Blackhat USA-2010 - Las Vegas, USA Access Security
Pyretic – Reversing Obfuscated Python Bytecode & Live Python Objects Rich Smith Blackhat USA-2010 - Las Vegas, USA Security Access
Hacking Browser'S Dom - Exploiting Ajax And Ria Shreeraj Shah Blackhat USA-2010 - Las Vegas, USA Security Access
Understanding The Windows Smb Ntlm Weak Nonce Vulnerability Hernan Ochoa , Agustin Azubel Blackhat USA-2010 - Las Vegas, USA Security Access
Wpa Migration Mode: Wep Is Back To Haunt You... Leandro Federico Meiners , Diego Sor Blackhat USA-2010 - Las Vegas, USA Security Access
How To Hack Millions Of Routers Craig Heffner Blackhat USA-2010 - Las Vegas, USA Security Access
Hacking And Protecting Oracle Database Vault Esteban Martínez Fayó Blackhat USA-2010 - Las Vegas, USA Security Access Auditing
Unauthorized Internet Wiretapping: Exploiting Lawful Intercept Tom ( Decius ) Cross Blackhat USA-2010 - Las Vegas, USA Security Access
A Web Vulnerability Assessment View Jeremiah Grossman SANS Pen Test Summit-2010 - Baltimore, USA Security Infrastructure Web Application Security Access
Authorization Attacks Using Session Hijacking” Andreas Venieris AthCon-2010 - Athens, Greece Security Access Control Access
Personal Identity Verification Interoperability (Piv-I) Sal D'agostino Security B-Sides Boston-2010 - Boston, USA Access Control Access Intrusion Detection
Where Did Those Damn Packets Go? Kevin A Nassery THOTCON-1 - Chicago, USA Security Infrastructure Access Monitoring
Windows File Pseudonyms - Strange Filenames And Haiku Daniel Crowley QuahogCon-2010 - USA Security Access
Windows File Pseudonyms: Pwnage And Poetry Daniel Crowley SOURCE Boston-2010 - Boston, USA Security Access
The Four Types Of Locks, Deviant Ollam SOURCE Boston-2010 - Boston, USA Security Access
We Found Carmen San Diego Don Bailey SOURCE Boston-2010 - Boston, USA Security Access
Hardware Is The New Software Joe ( Kingpin ) Grand Blackhat Europe-2010 - Barcelona, Spain Security Access
Targeted Attacks: From Being A Victim To Counter Attacking Andrzej Dereszowski Blackhat Europe-2010 - Barcelona, Spain Security Access Exploitation Analysis
Abusing Jboss Christian Papathanasiou Blackhat Europe-2010 - Barcelona, Spain Security Access Exploitation
Security In Depth For Linux Software Julien Evans Blackhat Europe-2010 - Barcelona, Spain Security Access
Getting More Out Of App Vuln Scan Results Dan Dan cornell Security B-Sides Austin-2010 - Austin, USA Others Firewall Access Control Access Exploitation Risk
The Esapi Web Application Firewall (Esapi Waf) Arshan Dabirsiaghi OWASP Appsec-2009 - Washington DC, USA Web Access Control Access
Security In-Depth For Linux Software Chris Evans HITBSecConf Malaysia-2009 - Kuala Lampur, Malaysia Security Access
Modern Day Robin Hoods? Rop Gonggrijp HITBSecConf Malaysia-2009 - Kuala Lampur, Malaysia Security Access
Hardware Is The New Software Joe Kingpin HITBSecConf Malaysia-2009 - Kuala Lampur, Malaysia Security Access
Nemesis: Preventing Authentication & Access Control Vulnerabilities In Web Applications Michael Dalton , Christos Kozyrakis 18th USENIX Security Symposium-2009 - Montreal, Canada Security Web Access
An Emulation Of Geni Access Control Soner Sevinc , Larry Peterson , Trevor Fern·ndez 2nd Workshop on Cyber Security Experimentation and Test -2009 - Montreal, Canada Security Access
Unauthorized Access Anonymous Speaker NinjaCon-2009 - Vienna, Austria Security Access
Invisible Access: Electronic Access Control, Audit Trails And High Security Marc Weber Tobias , Tobias Bluzmanis , Matt Fiddler DEF CON-17 - Las Vegas, USA Security Access
Reconstructing Dalvik Applications (Google Android) Marc Schoenfeld SyScan-2009 - Taipei, Taiwan Security Access
Hacking Citrix Brett ( Antic0de ) Moore SyScan-2009 - Singapore Security Access
Reconstructing Dalvik Applications (Google Android) Marc Schoenfeld SyScan-2009 - Singapore Security Access
Anti-Debugging - A Developers Perspective Txs CarolinaCon-5 - Raleigh, USA Security Access Analysis Malware Development
Information Security In Higher Education: Baby Steps Adam Dodge , Kees Leune SOURCE Boston-2009 - Boston, USA Security Others Access Business
Anti-Debugging - A Developer'S Viewpoint Tyler ( Txs ) Shields SOURCE Boston-2009 - Boston, USA Security Access Analysis Malware Development
Rfid Unplugged 3ric Johanson ShmooCon-2009 - Washington DC, USA Security Access Testing
Faifa: A First Open Source Plc Tool Florian Echtler Chaos Communication Congress-25 - Berlin, Germany Security Access
Messing Around With Garage Doors Thomas Eisenbarth Chaos Communication Congress-25 - Berlin, Germany Security Access
Next Generation Reverse Shell (Ngrs) Ar HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Firewall Access
Ipwning The Iphone Charlie Miller HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Fuzzing Access Exploitation
Pass-The-Hash Toolkit For Windows Hernan Ochoa HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Access Development
Moocherhunting: Real-Time Geo-Location Of Moochers, Hackers And Unauthorized Wifi Users Julian Ho HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Infrastructure Wireless Access Auditing Testing
Hacking Internet Kiosks Paul Craig HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Access Exploitation Browser
Delivering Identity Management 2.0 By Leveraging Opss Thomas Varghese HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Access
Access Control For Federation Of Emulab-Based Network Testbeds Ted Faber , John Wroclawski 1st Workshop on Cyber Security Experimentation and Test-2008 - San Jose, USA Security Access
Strengths And Weaknesses Of (Physical) Access Control Systems Eric "Unlocked" Schmiedl , Mike Spindel The Last HOPE-2008 - USA Security Access
Autonomously Bypassing Voip Filters With Asterisk: Let Freedom Ring Blake Cornell , Jeremy Mcnamara The Last HOPE-2008 - USA Security Others Access
Phreaking 110: The State Of Modern Phreaking I-ball The Last HOPE-2008 - USA Security Access Legal
Policy Hacking: Taking Back Public Sector It Arjen Kamphuis The Last HOPE-2008 - USA Security Others Access
Sharing Your Love Of Technology With Normal People - Prometheus Radio Project Tips Pete Tridish , Steph99 The Last HOPE-2008 - USA Security Others Access Media
Killing The Myth Of Cisco Ios Rootkit Sebastian Muniz SyScan-2008 - Singapore Security Access
Content Awareness – A Cornerstone To Data Protection John Amaral SOURCE Boston-2008 - Boston, USA Security Access Risk Analysis Business
Vulnerability In The Real World: Lessons From Both Sides Of The Fence Ryan Permeh SOURCE Boston-2008 - Boston, USA Security Access
Don'T Tell Me What, Tell Me Who: Correlating User Identity And Application Data To Threats Sandy Bird SOURCE Boston-2008 - Boston, USA Security Access Compliance
Voip Penetration Testing: Lessons Learned Jason Kindervag ShmooCon-2008 - Washington DC, USA Security Access
What Is Terrorism? Anne Roth Chaos Communication Congress-24 - Berlin, Germany Security Access
The Arctic Cold War Bicyclemark Chaos Communication Congress-24 - Berlin, Germany Security Access
One Token To Rule Them All Luke Jennings Chaos Communication Congress-24 - Berlin, Germany Security Access
Haxe Nicolas Cannasse Chaos Communication Congress-24 - Berlin, Germany Security Access
Hacking The Bluetooth Stack For Fun, Fame And Profit Dino Covotsos HITBSecConf Malaysia-2007 - Kuala Lampur, Malaysia Security Wireless Access Business Testing
Enterprise Hacking: Who Needs Exploit Codes? Fetri Miftach HITBSecConf Malaysia-2007 - Kuala Lampur, Malaysia Security Access Risk Analysis Business Development
Geolocation Of Wireless Access Points And Wireless Geocaching Rick Hill DEF CON-15 - Las Vegas, USA Security Wireless Access
Biometric And Token Based Access Control Systems: Are You Protected By Two Screws And A Plastic Cover? Probably. Zac Franken DEF CON-15 - Las Vegas, USA Security Access
Strengths And Weaknesses Of Access Control Systems Eric SchmiedlMike Spindel Blackhat USA-2007 - Las Vegas, USA Security Access
Timing Attacks For Recovering Private Entries From Database Engines Pablo Damian Saura Blackhat USA-2007 - Las Vegas, USA Security Web Access Exploitation
Blind Security Testing—An Evolutionary Approach Scott Stender Blackhat USA-2007 - Las Vegas, USA Security Access Testing
Attacking The Windows Kernel Jonathan Lindsay Blackhat USA-2007 - Las Vegas, USA Security Access
Examining The On-Line Black Market Professor Tom Holt CarolinaCon-3 - Raleigh, USA Security Web Access Malware
Next Generation Debuggers For Reverse Engineering Eresi Team Blackhat Europe-2007 - Amsterdam, The Netherlands Security Access
Bypassing Nac Systems (Part Ii) Ofir Arkin ShmooCon-2007 - Washington DC, USA Security Infrastructure Access
Dissecting Shmoocon Labs ShmooCon-2007 - Washington DC, USA Security Wireless Access
Know Your Citizens Marco Gercke Chaos Communication Congress-23 - Berlin, Germany Security Access
Tor And China Roger Dingledine Chaos Communication Congress-23 - Berlin, Germany Security Anonymity Access
The World Through The Eyes Of A Signature Developer Jonathan Limbo HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Access
Hacking A Bird In The Sky: Hijacking Vsat Connections Jim Geovedi HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Wireless Access Development Testing
Underground Documentaries: The Art Of The Interview And The Access Jason Scott , Julien Mcardle HOPE Number 6-2006 - USA Security Access
Aether Madness With The Prometheus Radio Project Pete Tridish , Dharma Dailey , Hannah Sassaman , Andy Gunn , Anthony Mazza HOPE Number 6-2006 - USA Security Wireless Panel Access Community Media
E-Gold - As Misunderstood As Hackers Richard Cheshire , Oddsman HOPE Number 6-2006 - USA Security Access
Flash Sucks For Advertisers - The Digital Divide Richard Cheshire , Gerald Greene HOPE Number 6-2006 - USA Security Access
Hacking Copyright And Culture Fred Benenson HOPE Number 6-2006 - USA Security Access
How To Steaomeone'S Implanted Rfid - And Why Yod Want To Annalee Newitz , Jonathan Westhues HOPE Number 6-2006 - USA Security Access
College Of Hacking: Successful Network Penetration For Dummies Vic Vandal CarolinaCon-2 - Raleigh, USA Security Access
Ibm Iseries For Penetration Testers: Bypass Restrictions And Take Over Server Shalom Carmel Blackhat Europe-2006 - Amsterdam, The Netherlands Security Access
Wi-Fi Trickery, Or How To Secure, Break And Have Fun With Wi-Fi (Bof It!) Franck Veysset , Laurent Butti ShmooCon-2006 - Washington DC, USA Security Access
Advances In Single Packet Authorization (Build It!) Michael Rash ShmooCon-2006 - Washington DC, USA Security Access Monitoring Exploitation
Playing Server Hide And Seek (Break It!) Lasse Overlier , Paul Syverson ShmooCon-2006 - Washington DC, USA Security Anonymity Access Privacy Workshops
Anonym.Os: Security And Privacy, Everywhere You Go (Build It!) Taylor Banks , Gavin Mead , Kevin Miller , Beth Milliken ShmooCon-2006 - Washington DC, USA Security Anonymity Access Privacy Monitoring Risk Legal Development
Access To Knowledge Karsten Gerloff Chaos Communication Congress-22 - Berlin, Germany Security Access
Complete Hard Disk Encryption With Freebsd Marc Schiesser Chaos Communication Congress-22 - Berlin, Germany Security Access Risk
Attacking Biometric Access Control Systems Zamboni DEF CON-13 - Las Vegas, USA Security Access
Auditing Data Access Without Bringing Your Database To Its Knees&Nbsp; Kimber Spradin , Dale Brocklehurst Blackhat USA-2005 - Las Vegas, USA Security Access Auditing
Carrier Voip Security Nicolas Fischbach Blackhat USA-2005 - Las Vegas, USA Security Infrastructure Access
The Statue Of Liberty: Utilizing Active Honeypots For Hosting Potentially Malicious Events Philip Trainor Blackhat USA-2005 - Las Vegas, USA Security Access Risk
The Non-Cryptographic Ways Of Losing Information Robert Morris Blackhat USA-2005 - Las Vegas, USA Security Access
Can You Really Trust Hardware? Exploring Security Problems In Hardware Devices Joe ( Kingpin ) Grand Blackhat USA-2005 - Las Vegas, USA Security Access
Can You Really Trust Hardware? Exploring Security Problems In Hardware Devices Joe ( Kingpin ) Grand Blackhat Europe-2005 - Amsterdam, The Netherlands Security Access
Physical Security Barry Grundy , Mark Seiden Chaos Communication Congress-21 - Berlin, Germany Security Access Business
Hacking Linux-Powered Devices Stefan Arentz Chaos Communication Congress-21 - Berlin, Germany Security Wireless Access
Hardware Bus Security In Embedded Systems Dan Matthews The Fifth HOPE -2004 - USA Security Access Risk
Technology In Romania Catalin Acio The Fifth HOPE -2004 - USA Security Access
A Historical Look At Hardware Token Compromises Joe ( Kingpin ) Grand Blackhat USA-2004 - Las Vegas, USA Security Access
Dkom (Direct Kernel Object Manipulation) Jamie Butler Blackhat Europe-2004 - Amsterdam, The Netherlands Security Rootkits Access
Dynamic Detection And Prevention Of Race Conditions In File Accesses Eugene TsyrklevichVlad Tsyrklevich Blackhat Europe-2004 - Amsterdam, The Netherlands Security Access
Connect -≫ Plug N Politix Bonzai@so36.net Chaos Communication Congress-20 - Berlin, Germany Security Access
High Security Locks, And Access Control Products Michael Glasser Crl , Laz Blackhat USA-2003 - Las Vegas, USA Security Access
Design And Software Vulnerabilities In Embedded Systems Felix ( FX ) Lindner Blackhat Europe-2003 - Amsterdam, The Netherlands Security Access Exploitation
Attacking Networked Embedded Systems Felix ( FX ) Lindner Chaos Communication Congress-19 - Berlin, Germany Security Access Exploitation
Wireless Access Point Mapping Simon D. Byers 11th USENIX Security Symposium-2002 - San Francisco, USA Security Wireless Access
Access And Integrity Control In A Public-Access, High-Assurance Configuration Management System Jonathan S. Shapiro , John Vanderburgh 11th USENIX Security Symposium-2002 - San Francisco, USA Security Access
Biometric Authentication Technologies: Hype Meets The Test Results (Pdf) James L. Wayman 11th USENIX Security Symposium-2002 - San Francisco, USA Security Access
High Security Locks, And Access Control Products Michael Glasser Crl , Laz DEF CON-10 - Las Vegas, USA Security Access
Access Control Devices Michael D. Glasser H2K2-2002 - USA Security Access
Fucking Up The Internet At Icann: Global Control Through The Domain Name System And How To Escape Andy Mueller-maguhn H2K2-2002 - USA Security Access
Keynote: Aaron Mcgruder Aaron Mcgruder H2K2-2002 - USA Security Access
Proximity Cards: How Secure Are They? Anonymous H2K2-2002 - USA Security Access Privacy
The Biometrics Dilemma Rick Smith Blackhat USA-2002 - Las Vegas, USA Security Firewall Access
Setiri: Advances In Trojan Technology Roelof ( RT ) Temmingh , Haroon Meer Blackhat USA-2002 - Las Vegas, USA Security Firewall Access
Mobile Security: Sms And Wap Job de Haas Blackhat Europe-2001 - Amsterdam, The Netherlands Mobile Security Security Others Access
Smart Card Security Marc Witteman Blackhat Europe-2001 - Amsterdam, The Netherlands Security Access Cryptography
Kerberized Credential Translation: A Solution To Web Access Control Peter Honeyman , Kevin Coffman , Olga Kornievskaia , Bill Doster 10th USENIX Security Symposium-2001 - Washington DC, USA Security Web Access
Low Bandwidth Access To The Internet Anonymous H2K-2000 - USA Security Access
Internet Security Using Open Source Software Justin Cheung , Don Marti H2K-2000 - USA Security Access
Information On The Masses Anonymous H2K-2000 - USA Security Access
Certification Structures For Hackers (Foundation Of The Ccc-Ca) Doobee R. Tzeck Chaos Communication Congress-16 - Berlin, Germany Security Access
Biometrics Workshop Andreas Steinhauser Chaos Communication Congress-16 - Berlin, Germany Security Access
Access Control Christoph Schuba 8th USENIX Security Symposium-1999 - Washington DC, USA Security Access
Scalable Access Control For Distributed Object Systems Daniel F. Sterne , David L. Sherman , Gregg W. Tally , C. Durward Mcdonell , David L. Sames , Pierre X. Pasturel , E. John Sebes 8th USENIX Security Symposium-1999 - Washington DC, USA Security Access
Certificate-Based Access Control For Widely Distributed Resources Mary R. Thompson , William Johnston , Srilekha Mudumbai , Gary Hoo , Keith Jackson , Abdelilah Essiari 8th USENIX Security Symposium-1999 - Washington DC, USA Security Access
Activex Insecurities Richard M. Smith 8th USENIX Security Symposium-1999 - Washington DC, USA Security Access Browser
Modern Netware Hacking Simple Nomad Blackhat USA-1999 - Las Vegas, USA Security Web Access
Vpn Architectures: Looking At The Complete Picture. David Bovee Blackhat USA-1999 - Las Vegas, USA Security Access
Penetrating Nt Networks Through Information Leaks And Policy Weaknesses. Dominique Brezinski Blackhat USA-1998 - Las Vegas, USA Security Access
Socks, Pptp & Ipsec: Implementation & Futures John Bailey Blackhat USA-1998 - Las Vegas, USA Security Access
An Architecture For Advanced Packet Filtering And Access Policy Andrew Molitor 5th USENIX UNIX Security Symposium-1995 - Salt Lake City, USA Security Access
Approximating Clark-Wilson Access Triples With Basic Unix Commands Wade Polk 4th UNIX Security Symposium-1993 - Santa Clara, USA Security Access Unix