Exploitation

Title Speakers Conference Tags
Taint Nobody Got Time for Crash Analysis Richard Johnson REcon-2013 - Montreal,Canada Exploitation Taint Tracking
Next generation rootkits for ARM based devices Thomas Roth hackinparis-2013 - Paris,France Android Rootkits Exploitation ARM TrustZone
LEAKING ADDRESSES WITH VULNERABILITIES THAT CAN'T READ GOOD Dionysus Blazakis SummerCon-2013 - New York,USA Exploitation Browser Javascript Information Leaks Timing Attacks
Swiping Through Modern Security Features Cyril \xe2\x80\x98@pod2g\xe2\x80\x99 , Eric \xe2\x80\x98@musclenerd\xe2\x80\x99 , David \xe2\x80\x98@planetbeing\xe2\x80\x99 Wang , Nikias \xe2\x80\x98@pimskeks\xe2\x80\x99 Bassen HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands Exploitation iOS Jailbreak
HOW TO CATCH A CHAMELEON: ITS ALL IN YOUR HEAP Steven Seeley Ruxcon-2012 - Melbourne, Australia Exploitation Heap Overflows Tools Immdbg
MODELING THE EXPLOITATION AND MITIGATION OF MEMORY SAFETY VULNS Matt Miller Breakpoint-2012 - Melbourne,Australia Exploitation Tools Metrics
IOS6 SECURITY Mark Dowd , Tarjei Mandt Breakpoint-2012 - Melbourne,Australia Exploitation iOS
UNRAVELLING WINDOWS 8 SECURITY AND THE ARM KERNEL Alex Ionescu Breakpoint-2012 - Melbourne,Australia Exploitation Windows 8 Mitigations ARM
Innovative Approaches to Exploit Delivery Saumil Udayan Shah HITBSecConf Malaysia-2012 - KL, Malaysia Exploitation Web Security Attack
Into the Droid: Gaining Access to Android User Data Thomas Cannon DEF CON-20 - Las Vegas, USA Android Exploitation Mobile Security
DE MYSTERIIS DOM JOBSIVS: MAC EFI ROOTKITS Loukas K BlackHat USA-2012 - Las Vegas, USA Exploitation EFI Mac OS
EASY LOCAL WINDOWS KERNEL EXPLOITATION Cesar Cerrudo BlackHat USA-2012 - Las Vegas, USA Exploitation Kernel Windows
SQL INJECTION TO MIPS OVERFLOWS: ROOTING SOHO ROUTERS Zachary Cutlip BlackHat USA-2012 - Las Vegas, USA Buffer Overflows Exploitation SQL Injection
XMPPloit Luis Delgado BlackHat USA-2012 - Las Vegas, USA Exploitation SSL XMPP
From the Iriscode to the Iris: a new vulnerability of Iris recognition systems Javier Galbally BlackHat USA-2012 - Las Vegas, USA Exploitation Biometrics Iris Genetic Algorithm
STATE OF WEB EXPLOIT TOOLKITS Jason Jones BlackHat USA-2012 - Las Vegas, USA Web Exploitation
HOOKIN' AIN'T EASY: BEEF INJECTION WITH MITM Ryan Linn , Steve Ocepek BlackHat USA-2012 - Las Vegas, USA Exploitation Browser Man-in-the-middle
RECENT JAVA EXPLOITATION TRENDS AND MALWARE Jeong wook Oh BlackHat USA-2012 - Las Vegas, USA Exploitation Java
WINDOWS PHONE 7 INTERNALS AND EXPLOITABILITY Tsukasa Oi BlackHat USA-2012 - Las Vegas, USA Exploitation Windows Phone 7
ADVANCED CHROME EXTENSION EXPLOITATION - LEVERAGING API POWERS FOR THE BETTER EVIL Kyle Osborn , Krzysztof Kotowicz BlackHat USA-2012 - Las Vegas, USA Exploitation Google Chrome Extensions
BLENDED THREATS AND JAVASCRIPT: A PLAN FOR PERMANENT NETWORK COMPROMISE Josh ( savant ) Brashars , Phil Purviance BlackHat USA-2012 - Las Vegas, USA Exploitation Cross Site Request Forgery
CONFESSIONS OF A WAF DEVELOPER: PROTOCOL-LEVEL EVASION OF WEB APPLICATION FIREWALLS Ivan Ristic BlackHat USA-2012 - Las Vegas, USA Exploitation Web Application Firewall
THE INFO LEAK ERA ON SOFTWARE EXPLOITATION Fermin J. Serna BlackHat USA-2012 - Las Vegas, USA Exploitation Information Leaks
EXPLOITATION OF WINDOWS 8 METRO STYLE APPS Sung-ting Tsai , Ming-chieh Pan BlackHat USA-2012 - Las Vegas, USA Exploitation Windows 8 AppContainer Sandbox
WINDOWS 8 HEAP INTERNALS Chris Valasek , Tarjei Mandt BlackHat USA-2012 - Las Vegas, USA Deep Knowledge Exploitation Windows 8 Heap Overflows
Advanced ARM exploitation Stephen Ridley , Stephen Lawler BlackHat USA-2012 - Las Vegas, USA Exploitation ARM
CVE-2012-0769, the case of the perfect info leak Fermin Serna SummerCon-2012 - Brooklyn, USA Exploitation Flash
The Exploit Intelligence Project Dan Guido SOURCE Boston-2011 - Boston, USA Exploitation
Usb Autorun Attacks Against Linux Jon Larimer ShmooCon-2011 - Washington DC, USA Security Access Exploitation Malware
Printers Gone Wild! Ben Smith ShmooCon-2011 - Washington DC, USA Security Panel Exploitation Browser
Non-Obvious Bugs By Example Greg Berlinsides-2010 - Berlin, Germany Security Exploitation
Finding Backdoors In Code Matias Madou OWASP BeNelux-2010 - Netherlands Security Exploitation
How Not To Implement A Payback/Cashback System Thierry Zoller OWASP BeNelux-2010 - Netherlands Infrastructure Exploitation
0Wning Networks With Voip And Web Attacks Radu State OWASP BeNelux-2010 - Netherlands Infrastructure Firewall Exploitation Web Security
Windows Exploit Mitigation Techniques Brett ( Antic0de ) Moore KiwiCon-2010 - Wellington, New Zealand Exploitation
Hacking Sap Businessobjects Will Vandevanter , Joshua Abraham OWASP BASC-2010 - Boston, USA Security Application Security Exploitation Risk
The Exploit Arms Race Christien ( Dildog ) Rioux OWASP BASC-2010 - Boston, USA Security Exploitation Cyberwar
Exploring Three Modern Attack Vectors: Insiders, Industrialized And Apts Brian Contos OWASP AppSec Brasil-2010 - Brazil Exploitation
The Hidden Nemesis: Backdooring Embedded Controllers Ralf-Philipp Weinmann PacSec-2010 - Tokyo, Japan Security Exploitation
Cyber-Assurance Ecosystem - Automation Activities For Securing The Enterprise Joe Jarzombek OWASP Appsec-2010 - Washington DC, USA Security Exploitation Cyberwar
Unlocking The Toolkit: Attacking Google Web Toolkit Ron Gutierrez OWASP Appsec-2010 - Washington DC, USA Security Web Exploitation
Smart Phones With Dumb Apps: Threat Modeling For Mobile Applications Dan Dan cornell OWASP Appsec-2010 - Washington DC, USA Mobile Security Android Security Exploitation
Friendly Traitor 2 Features Are Hot But Giving Up Our Secrets Is Not! Mike Poor , Kevin Johnson OWASP Appsec-2010 - Washington DC, USA Security Exploitation
Mass Exploitation For Dummies Greg Martin Security B-Sides DFW-2010 - USA Exploitation Application Security
Testing The Limits Of Ev Certificates Philippe Oechslin hashdays-2010 - Lucerne, Switzerland Security Exploitation Browser
Threats And Countermeasures - Human Factor And Physical Security Jim Broome House Con-2010 - USA Exploitation Social Engineering Risk
Smart Phones With Dumb Apps Dan Dan cornell House Con-2010 - USA Mobile Security Security Exploitation
Passwords In Corporate Networks Carric Dooley , Simon Roses Femerling SOURCE Barcelona-2010 - Barcelona, Spain Security Others Firewall Exploitation
Anatomy Of A Logic Flaw Charles Henderson , Garrett Held LASCON-2010 - Austin, USA Exploitation Security
Some Things That Every Vulnerability Developer Should Know Halvar Flake t2-2010 - Helsinki, Finland Security Exploitation Development
Protecting Yourself In A Public Wireless Network Hugo Gonzalez BugCon-2010 - Mexico Security Wireless Web Exploitation
Live Hacking, The Bug To Exploit Alejandro Hernandez BugCon-2010 - Mexico Exploitation
Cracking Software Rodolfo Hernandez BugCon-2010 - Mexico Exploitation
Vulnerabilities In Mexico Modems Pedro "hkm" Joaquin BugCon-2010 - Mexico Exploitation Hardware Reverse Engineering Hardware General
Loss Of Data, What Bug? Edgar Gómez BugCon-2010 - Mexico Security Exploitation Data Exfiltration
Web Attack And Defense Trends Frank Fan OWASP China-2010 - China Web Exploitation
Browser Hacks, Design Flaws, & Opt-In Security Jeremiah Grossman BlueHat-2010 - Redmond, USA Security Exploitation Browser
Payload Already Inside: Data Re-Use For Rop Exploits Long Le HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Security Web Exploitation Analysis
Cache On Delivery Marco Slaviero HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Security Web Exploitation Cloud
Iphone Security Model And Vulnerabilities Cedric Halbronn HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Security Web Access Exploitation Analysis Browser
Remote Binary Planting – An Overlooked Vulnerability Affair Mitja Kolsek HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Exploitation
Payload Already Inside: Data Re-Use For Rop Exploits Long Le , Thanh Nguyen HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Exploitation
Powershell.. What Every Hax0R Needs To Know Jameel Haffejee ZaCon-2 - Johannesburg, South Africa Security Exploitation Network Penetration
The Jar Of Joy... Ian De Villiers ZaCon-2 - Johannesburg, South Africa Security Exploitation Analysis
How I Met Your Girlfriend Samy Kamkar BruCON-2010 - Brussels, Belgium Web Exploitation
Top 5 Ways To Steal A Company Chris Nickerson BruCON-2010 - Brussels, Belgium Security Others Deep Knowledge Exploitation
Finding Backdoors In Code Matias Madou BruCON-2010 - Brussels, Belgium Security Exploitation Network Penetration
Embedded System Hacking And My Plot To Take Over The World Paul Asadoorian BruCON-2010 - Brussels, Belgium Web Exploitation Hardware Reverse Engineering
The Evolution Of Security Testing: Testing The Resiliency Of Security David Stubley OWASP Dublin-2010 - Ireland Security Others Exploitation
(Too Much) Access Points - Exploitation Roundup Cristofaro Mune SyScan-2010 - Taipei, Taiwan Security Access Exploitation
Hacking Printers For Fun And Profit Andrei Costin SyScan-2010 - Taipei, Taiwan Security Exploitation Malware
The Conundrum Of Declarative Security Http Response Headers: Lessons Learned Richard Enbody , Aditya K Sood CollSec-2010 - Washington DC, USA Security Web Exploitation Browser
Interpreter Exploitation Dionysus Blazakis 4th USENIX Workshop on Offensive Technologies -2010 - Washington DC, USA Security Exploitation
Binary Exploitation Basics Joern Bratzke NinjaCon-2010 - Vienna, Austria Security Exploitation
Kicking The Vulnerabilities Out Of Microsoft Patches Yaniv Miron NinjaCon-2010 - Vienna, Austria Security Application Security Exploitation
Exploitation On Arm - Technique And Bypassing Defense Mechanisms Itzhak "Zuk" Avraham DEF CON-18 - Las Vegas, USA Security Exploitation
Antique Exploitation (Aka Terminator 3: Point One One For Workgroups) Jon Oberheide DEF CON-18 - Las Vegas, USA Security Exploitation
Returning Into The Php Interpreter - Remote Exploitation Of Memory Corruptions In Php Is Not Over, Yet. Stefan Esser SyScan-2010 - Singapore Security Exploitation
Office Is Still Yummy - How To Defeat Memory Protections In Office Document Exploitation Nanika&tt SyScan-2010 - Singapore Security Exploitation
Dep In Depth Brett ( Antic0de ) Moore SyScan-2010 - Singapore Security Exploitation
Web In The Middle Laurent Oudot HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Exploitation
Owned Live On Stage Niels Teusink HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Security Wireless Exploitation Network Penetration
Jit Spray Attacks And Advanced Shellcode Alexey Sintsov HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Security Exploitation
Abusing Microsofts Postmark Validation Dumitri Codreanu HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Security Exploitation
Firefox 4 And Opportunities For Security Research Chris Hofmann HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Security Exploitation Analysis
Understanding The Low-Fragmentation Heap: From Allocation To Exploitation Chris Valasek Blackhat USA-2010 - Las Vegas, USA Security Exploitation
Advanced Aix Heap Exploitation Methods Tim Shelton Blackhat USA-2010 - Las Vegas, USA Security Exploitation
Adventures In Limited User Post Exploitation Nathan Keltner , Tim Elrod Blackhat USA-2010 - Las Vegas, USA Security Exploitation
Return-Oriented Exploitation Dino Dai Zovi Blackhat USA-2010 - Las Vegas, USA Security Exploitation
Aleatory Persistent Threat Nicolas Waisman Blackhat USA-2010 - Las Vegas, USA Security Community Exploitation
Lifting The Fog Marco Slaviero Blackhat USA-2010 - Las Vegas, USA Security Exploitation Cloud
Getting In Bed With Robin Sage Thomas Ryan Blackhat USA-2010 - Las Vegas, USA Security Exploitation
Payload Already Inside: Data Re-Use For Rop Exploits Long Le Blackhat USA-2010 - Las Vegas, USA Security Exploitation
Everybody Be Cool This Is A Roppery! Tim Weinmann , Vincenzo Iozzo Blackhat USA-2010 - Las Vegas, USA Security Exploitation Development
Https Can Byte Me Josh Sokol , Robert ( Rsnake ) Hansen Blackhat USA-2010 - Las Vegas, USA Security Infrastructure Exploitation
Harder, Better, Faster, Stronger: Semi-Auto Vulnerability Research Lurene ( pusscat ) Grenier , Richard Johnson Blackhat USA-2010 - Las Vegas, USA Security Fuzzing Exploitation
Web Vulnerability Exploitation Post Nahuel Grisolía OWASP Argentina-2010 - Argentina Exploitation Web
Ldap Injection: Attack And Defense Techniques In Web Applications Hernan Abbamonte OWASP Argentina-2010 - Argentina Security Web Exploitation
Exploiting Botnets For Profit And Fun Greg Martin Security B-Sides Las Vegas-2009 - Las Vegas, USA Security Exploitation Malware
Cain Beef Hash: Snagging Passwords Without Popping Boxes Ryan Linn Security B-Sides Las Vegas-2009 - Las Vegas, USA Security Exploitation
Csfire: Browser-Enforced Mitigation Against Csrf Lieven Desmet , Philippe De ryck OWASP Appsec-2010 - Stocholm, Sweden Security Exploitation Browser
Deconstructing Coldfusion Chris Eng OWASP Appsec-2010 - Stocholm, Sweden Security Others Deep Knowledge Exploitation Risk
Responsibility For The Harm And Risk Of Software Security Flaws Cassio Goldschmidt OWASP Appsec-2010 - Stocholm, Sweden Security Application Security Exploitation
Kim Jong-Il And Me: How To Build A Cyber Army To Attack The U.S. Charlie Miller CCDCOE-2010 - Estonia Security Exploitation Risk Media Law Enforcement Application Security Cyberwar
Making The Most Out Of Post-Exploitation Paul Asadoorian SANS Pen Test Summit-2010 - Baltimore, USA Incident Response Exploitation
“Attack Cms System – 0Day Exploitation“ Anastasios Stasinopoulos AthCon-2010 - Athens, Greece Security Exploitation
“Abusing Jboss” Christian Papathanasiou AthCon-2010 - Athens, Greece Security Others Application Security Exploitation
Vulnerabilities In Secure Code - Now And Beyond Alex Wheeler , Ryan Smith OWASP FROC-2010 - Denver, USA Security Exploitation
Application Security Program Management With Vulnerability Manager Bryan Beverly OWASP FROC-2010 - Denver, USA Security Application Security Exploitation
Exploiting Windows Dep Using Return-Oriented Programming Dino Dai Zovi ITWeb Security Summit-2010 - Johannesburg, South Africa Exploitation
Advanced Sql Injection Joe Mccray QuahogCon-2010 - USA Exploitation
Killerbee: Practical Zigbee Exploitation Joshua Wright QuahogCon-2010 - USA Security Exploitation
Linux Kernel Exploitation: Earning Its Pwnie A Vuln At A Time, Jon Oberheide SOURCE Boston-2010 - Boston, USA Security Community Exploitation
Neurosurgery With Meterpreter Colin Ames SOURCE Boston-2010 - Boston, USA Security Exploitation
Binding The Daemon: Freebsd Kernel Stack And Heap Exploitation Patroklos Argyroudis Blackhat Europe-2010 - Barcelona, Spain Security Exploitation
Targeted Attacks: From Being A Victim To Counter Attacking Andrzej Dereszowski Blackhat Europe-2010 - Barcelona, Spain Security Access Exploitation Analysis
Adobe Reader'S Custom Memory Management: A Heap Of Trouble Haifei Lovet Blackhat Europe-2010 - Barcelona, Spain Security Exploitation
Abusing Jboss Christian Papathanasiou Blackhat Europe-2010 - Barcelona, Spain Security Access Exploitation
Will It Blend? Billy Rios Ruxcon-2010 - Melbourne, Austrailia Security Exploitation
Getting More Out Of App Vuln Scan Results Dan Dan cornell Security B-Sides Austin-2010 - Austin, USA Others Firewall Access Control Access Exploitation Risk
Web App (In)Security On A Tight Budget Jason Jones Security B-Sides Austin-2010 - Austin, USA Web Application Security Exploitation Network Penetration
Exploitation Cole Minaar ZaCon-1 - Johannesburg, South Africa Exploitation Security
Assessing And Exploiting Web Applications With The Open Source Samurai Web Testing Framework Justin Searle OWASP Appsec-2009 - Washington DC, USA Security Web Exploitation
Defend Yourself: Integrating Real Time Defenses Into Online Applications Michael Coates OWASP Appsec-2009 - Washington DC, USA Exploitation
Unicode Transformations: Finding Elusive Vulnerabilities Chris Weber OWASP Appsec-2009 - Washington DC, USA Exploitation
Injectable Exploits: Two New Tools For Pwning Web Apps And Browsers Kevin Johnson OWASP Appsec-2009 - Washington DC, USA Web Exploitation Network Penetration
Hacking By Numbers Tom Brennan OWASP Appsec-2009 - Washington DC, USA Exploitation Automation
Attacking Interoperability Mark Dowd HITBSecConf Malaysia-2009 - Kuala Lampur, Malaysia Security Exploitation Browser
A New Web Attack Vector: Script Fragmentation Stephan Chenette BruCON-2009 - Brussels, Belgium Web Exploitation Risk
Rage Against The Kiosk Paul Craig BruCON-2009 - Brussels, Belgium Security Others Exploitation
Modern Exploitation And Memory Protection Bypasses Alexander Sotirov 18th USENIX Security Symposium-2009 - Montreal, Canada Security Exploitation
Advanced Mysql Exploitation Muhaimin Dzulfakar DEF CON-17 - Las Vegas, USA Security Exploitation
Router Exploitation Felix ( FX ) Lindner DEF CON-17 - Las Vegas, USA Security Exploitation
Using Guided Missiles In Drive-Bys: Automatic Browser Fingerprinting And Exploitation With Metasploit Egypt DEF CON-17 - Las Vegas, USA Security Exploitation Browser
Practical Windows Xp/2003 Heap Exploitation John Mcdonald , Chris Valasek Blackhat USA-2009 - Las Vegas, USA Security Exploitation
Router Exploitation Felix ( FX ) Lindner Blackhat USA-2009 - Las Vegas, USA Security Exploitation
Post Exploitation Bliss: Loading Meterpreter On A Factory Iphone Charlie Miller , Vincenzo Iozzo Blackhat USA-2009 - Las Vegas, USA Security Exploitation
State Of The Art Post Exploitation In Hardened Php Environments Stefan Esser Blackhat USA-2009 - Las Vegas, USA Security Exploitation
Using Guided Missiles In Drive-By'S: Automatic Browser Fingerprinting And Exploitation With Metasploit Egypt Blackhat USA-2009 - Las Vegas, USA Security Exploitation Browser
Advanced Mysql Exploitation Muhaimin Dzulfakar Blackhat USA-2009 - Las Vegas, USA Security Exploitation
State Of The Art Post Exploitation In Hardened Php Environments Stefan Esser SyScan-2009 - Taipei, Taiwan Security Exploitation
State Of The Art Post Exploitation In Hardened Php Environments Stefan Esser SyScan-2009 - Singapore Security Exploitation
Windows Nt Kernel Security Stephen Ridley SyScan-2009 - Singapore Security Exploitation Auditing
Outspect: Live Memory Forensic And Incident Response For Virtual Machine Nguyen Anh Quynh SyScan-2009 - Singapore Security Rootkits Exploitation Malware
Advanced Sql Injection Exploitation To Operating System Full Control Bernardo Guimaraes Blackhat Europe-2009 - Barcelona, Spain Security Exploitation SQL
Mac Os Xploitation Dino Dai Zovi SOURCE Boston-2009 - Boston, USA Security Exploitation
Horseless Carriage Exploits And Eavesdropping Defenses James Atkinson SOURCE Boston-2009 - Boston, USA Security Exploitation
Jsunpack: A Solution To Decode Javascript Exploits As They Rapidly Evolve Blake Hartstein ShmooCon-2009 - Washington DC, USA Security Community Exploitation Browser
Methods For Understanding Targeted Attacks With Office Documents Bruce Dang Chaos Communication Congress-25 - Berlin, Germany Security Exploitation
Exploiting Symbian Collin Mulliner Chaos Communication Congress-25 - Berlin, Germany Security Exploitation
Tricks: Makes You Smile Francesco `ascii` Ongaro Chaos Communication Congress-25 - Berlin, Germany Security Web Exploitation
Bluepilling The Xen Hypervisor Alexander Tereshkin HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Firewall Exploitation Malware
Ipwning The Iphone Charlie Miller HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Fuzzing Access Exploitation
Mac Os Xploitation Dino Dai Zovi HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Rootkits Wireless Exploitation Testing
Hacking Internet Kiosks Paul Craig HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Access Exploitation Browser
The Internet Is Broken: Beyond Document.Cookie - Extreme Client Side Exploitation John Heasman , Nathan Mcfeters , Rob Carter Blackhat USA-2008 - Las Vegas, USA Security Exploitation
Appsec A-Z: Reverse Engineering, Source Code Auditing, Fuzzing, And Exploitation Jared Demott Blackhat USA-2008 - Las Vegas, USA Security Exploitation
Hackernomics Hugh Thompson 17th USENIX Security Symposium-2008 - San Jose, USA Security Exploitation Development Automation
Real World Kernel Pool Exploitation Kostya Kortchinsky SyScan-2008 - Singapore Security Exploitation
Defeating Aslr And Dep Protections On Windows Vista Alexander Sotirov SyScan-2008 - Singapore Security Exploitation
Heaps About Heaps Brett ( Antic0de ) Moore SyScan-2008 - Singapore Security Exploitation
Telephone Defenses Against The Dark Arts James Atkinson SOURCE Boston-2008 - Boston, USA Security Exploitation Auditing
Crouching Powerpoint, Hidden Trojan Maarten Van Horenbeeck Chaos Communication Congress-24 - Berlin, Germany Security Exploitation
Vrda: Vulnerability Response Decision Assistance Hal Burch , Art Manion , Yurie Ito EC2ND-2007 - Heraklion, Greece Incident Response Exploitation
Signaling Vulnerabilities In Wiretapping Systems Eric Cronin EC2ND-2007 - Heraklion, Greece Exploitation
Tactical Exploitation H.d. Moore , Valsmith DEF CON-15 - Las Vegas, USA Security Exploitation
Javascript Heap Exploitation Methods Alexander Sotirov SyScan-2007 - Singapore Security Exploitation
Tactical Exploitation Valsmith Blackhat USA-2007 - Las Vegas, USA Security Exploitation
Understanding The Heap By Breaking It: A Case Study Of The Heap As A Persistent Data Structure Through Non-Traditional Exploitation Techniques Justin Ferguson Blackhat USA-2007 - Las Vegas, USA Security Exploitation
Remote And Local Exploitation Of Network Drivers Yuriy Bulygin Blackhat USA-2007 - Las Vegas, USA Security Exploitation
Timing Attacks For Recovering Private Entries From Database Engines Pablo Damian Saura Blackhat USA-2007 - Las Vegas, USA Security Web Access Exploitation
Heap Feng Shui In Javascript Alexander Sotirov Blackhat USA-2007 - Las Vegas, USA Security Exploitation
Openbsd Remote Exploit Alfredo Ortega Blackhat USA-2007 - Las Vegas, USA Security Exploitation
Kernel Wars Karl Janmar Blackhat USA-2007 - Las Vegas, USA Security Exploitation
Kernel Wars Christer Öberg Blackhat Europe-2007 - Amsterdam, The Netherlands Security Exploitation
Heap Feng Shui In Javascript Alexander Sotirov Blackhat Europe-2007 - Amsterdam, The Netherlands Security Exploitation
Voip Security Issues: Problems On The Users' Side And What Are The Providers Doing Wrong? Hendrik Scholz SyScan-2006 - Singapore Security Exploitation
Exploiting Embedded System Barnaby Jack SyScan-2006 - Singapore Security Exploitation
Wlsi - Windows Local Shellcode Injection Cesar Cerrudo Blackhat Europe-2006 - Amsterdam, The Netherlands Security Exploitation
Advances In Single Packet Authorization (Build It!) Michael Rash ShmooCon-2006 - Washington DC, USA Security Access Monitoring Exploitation
Exploiting Kmalloc Overflows To Own J00 Clflushandamnesia SyScan-2005 - Singapore Security Exploitation
Remote Windows Kernel Exploitation - Step In To The Ring 0 Barnaby Jack Blackhat USA-2005 - Las Vegas, USA Security Exploitation
Device Drivers Johnny cacheDavid Maynor Blackhat USA-2005 - Las Vegas, USA Security Exploitation
Economics, Physics, Psychology And How They Relate To Technical Aspects Of Counter Intelligence/Counter Espionage Within Information Security Peiter ( Mudge ) Zatko Blackhat USA-2005 - Las Vegas, USA Security Exploitation
Plug And Root, The Usb Key To The Kingdom David Dewey Blackhat USA-2005 - Las Vegas, USA Security Exploitation
Secure Instant Messaging Phar Chaos Communication Congress-21 - Berlin, Germany Security Exploitation
Windows Kernel Exploitation Sk Chong SyScan-2004 - Singapore Security Exploitation
The Keys To The Kingdom: Understanding Covert Channels Of Communication Russ Rogers Blackhat USA-2004 - Las Vegas, USA Security Exploitation
Practical Win32 And Unicode Exploitation Felix ( FX ) Lindner , Phenoelit Blackhat Europe-2004 - Amsterdam, The Netherlands Security Exploitation
Windows Local Kernel Exploitation S.k. Chong HITBSecConf Malaysia-2004 - Kuala Lampur, Malaysia Security Exploitation
Java 2 Micro Edition (J2Me) Security Vulnerabilities Adam Gowdiak HITBSecConf Malaysia-2004 - Kuala Lampur, Malaysia Security Exploitation
Practical Win32 And Unicode Exploitation Felix ( FX ) Lindner Chaos Communication Congress-20 - Berlin, Germany Security Exploitation
Microsoft Windows Rpc Security Vulnerabilities Last Delirium HITBSecConf Malaysia-2003 - Kuala Lampur, Malaysia Security Exploitation
Opensource Kernel Auditing And Exploitation Silvio Cesare DEF CON-11 - Las Vegas, USA Security Exploitation Auditing
Bsd Heap Smashing Bbp Blackhat Europe-2003 - Amsterdam, The Netherlands Security Exploitation
Design And Software Vulnerabilities In Embedded Systems Felix ( FX ) Lindner Blackhat Europe-2003 - Amsterdam, The Netherlands Security Access Exploitation
Attacking Networked Embedded Systems Felix ( FX ) Lindner Chaos Communication Congress-19 - Berlin, Germany Security Access Exploitation
Jello Biafra'S State Of The World Address Jello Biafra H2K2-2002 - USA Security Keynote Exploitation
Argus Pitbull Hack LSD Chaos Communication Congress-18 - Berlin, Germany Security Buffer Overflows Exploitation
Kernel Level Vulnerabilities Exploitation: Behind The Scenes Of The 5Th Argus Hacking Contest LSD Blackhat Europe-2001 - Amsterdam, The Netherlands Security Exploitation Analysis
Third Generation Exploits On Nt/Win2K Platforms Thomas ( Halvar Flake ) Dullien Blackhat Europe-2001 - Amsterdam, The Netherlands Security Exploitation Development Testing
Decoding And Understanding Internet Worms Dale Coddington , Ryan Permeh Blackhat Europe-2001 - Amsterdam, The Netherlands Security Exploitation Reverse Engineering Analysis Malware
Designing Small Payloads Anders Ingeborn DEF CON-09 - Las Vegas, USA Exploitation Security