Analysis

Title Speakers Conference Tags
Strategic Analysis of the iOS Jailbreak Development Community Dino Dai Zovi SourceBoston-2013 - Boston,USA Android Analysis iOS Jailbreak
Space Pope on Android Jon Oberheide , Charlie Miller SummerCon-2012 - Brooklyn, USA Analysis Google Bouncer
Dissecting The Hack: Malware Analysis 101 Gerry Brunelle CarolinaCon-7 - Raleigh, USA Security Analysis Malware
Defeating Mtans For Profit Axelle Apvrille , Kyle Yang ShmooCon-2011 - Washington DC, USA Security Analysis
Inside The App: All Your Data Are Belong To Me Sarah Edwards ShmooCon-2011 - Washington DC, USA Security Analysis
Half Baked: Hardware Hacking Mixed With Sweet Software Reverse Engineering Marc Eisenbarth ShmooCon-2011 - Washington DC, USA Security Analysis Forensics
Fun With Flow Richard Friedberg ShmooCon-2011 - Washington DC, USA Security Monitoring Analysis
3D Modeling And Visualization Of Real Time Security Events Dan Klinedinst ShmooCon-2011 - Washington DC, USA Security Monitoring Analysis
Tracking Flaws – Stream Reassembly Issues In Snort Ips Ashley Thomas ShmooCon-2011 - Washington DC, USA Security Analysis
Visualization And Analysis Of Large Scale Datasets With Opensource Tools Corbett ( corbett ) Berlinsides-2010 - Berlin, Germany Security Analysis
Sms-O-Death Nico Golde , Collin Mulliner Chaos Communication Congress-27 - Berlin, Germany Mobile Security Analysis
Automatic Identification Of Cryptographic Primitives In Software Felix Gröbert Chaos Communication Congress-27 - Berlin, Germany Analysis
Adventures In Analyzing Stuxnet Bruce Dang , Peter Ferrie Chaos Communication Congress-27 - Berlin, Germany Analysis Malware
Attacking Is Easy, Defending Is Hard Walter Belgers OWASP BeNelux-2010 - Netherlands Security Computer Forensics Network Penetration Analysis
Business Logic Attacks - Bats And Blbs Paul Schofield OWASP BASC-2010 - Boston, USA Security Others Analysis
Owasp Basics 1 And 2 Rob Cheyne OWASP BASC-2010 - Boston, USA Security Web Others Deep Knowledge Analysis
An Analysis Of Authentication Vulnerabilities In Cc And Fips 140-2 Certified Usb Tokens Jussipekka Leiwo PacSec-2010 - Tokyo, Japan Security Analysis
Understanding How They Attack Your Weaknesses: Capec Sean Barnum OWASP Appsec-2010 - Washington DC, USA Security Analysis
Using Misuse Cases To Articulate Vulnerabilities To Stakeholders Scott Mendenhall OWASP Appsec-2010 - Washington DC, USA Security Analysis
Solving Real World Problems With Esapi Anonymous Speaker OWASP Appsec-2010 - Washington DC, USA Security Analysis
Threats From Economical Improvement Eduardo Neves OWASP Appsec-2010 - Washington DC, USA Security Analysis
The Unintended Consequences Of Beating Users With Carrot Sticks: Radical Thoughts On Security Reform Ben Tomhave OWASP Appsec-2010 - Washington DC, USA Security Analysis
Patterns & Predictability - The Essence Of Attack Andrew Wilson Security B-Sides DFW-2010 - USA Security Analysis Statistics
Footprinting & Intelligence Gathering: Paterva & Beyond Wardell Motley Security B-Sides DFW-2010 - USA Security Analysis
An Introduction To Information Security Risk Analysis Patrick Florer Security B-Sides DFW-2010 - USA Security Risk Analysis
Shai-Hulud - The Quest For Worm Sign Ken Lamkin Security B-Sides DFW-2010 - USA Security Analysis Malware
Balancing The Pwn Trade Deficit Val Smith SOURCE Barcelona-2010 - Barcelona, Spain Security Community Analysis
Why Ha.Ckers.Org Doesn’T Get Hacked James Flom LASCON-2010 - Austin, USA Security Analysis
Conducting An Instiution-Wide, Multi-Department Application Security Assessment Jay Paz , Charlie Scott LASCON-2010 - Austin, USA Application Security Analysis
Full Disclousure About Cisco Vulnerabilities Alejandro Hernández Flores BugCon-2010 - Mexico Security Analysis Hardware General
Payload Already Inside: Data Re-Use For Rop Exploits Long Le HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Security Web Exploitation Analysis
Resilient Botnet Command And Control With Tor Dennis Brown HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Security Monitoring Analysis Malware Botnets
Virtually Pwned – Pentesting Vmware Claudio Criscione HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Security Web Analysis Testing
Iphone Security Model And Vulnerabilities Cedric Halbronn HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Security Web Access Exploitation Analysis Browser
The Jar Of Joy... Ian De Villiers ZaCon-2 - Johannesburg, South Africa Security Exploitation Analysis
Malicious Pdf Analysis Didier Stevens BruCON-2010 - Brussels, Belgium Security Others Analysis
State Of Ssl On The Internet - 2010 Survey Ivan Ristic OWASP Appsec-2010 - USA Security Web Others Analysis
Threat Modeling Best Practices Robert Zigweid OWASP Appsec-2010 - USA Security Analysis Business
Assessing, Testing And Validating Flash Content Peleus Uhley OWASP Appsec-2010 - USA Security Others Analysis
Coseinc Automated Malware Analysis Lab (Camal) Udi Shamir SyScan-2010 - Taipei, Taiwan Security Analysis Malware
An Ria Security Solution - Flash And Pdf Threat Handler Elson Lai SyScan-2010 - Taipei, Taiwan Security Web Analysis
An Analysis Of Private Browsing Modes In Modern Browsers Elie Bursztein , Gaurav Aggarwal , Collin Jackson , Dan Boneh 19th USENIX Security Symposium-2010 - Washington DC, USA Security Analysis
Botgrep: Finding P2P Bots With Structured Graph Analysis Shishir Nagaraja , Prateek Mittal , Chi-yao Hong , Matthew Caesar , Nikita Borisov 19th USENIX Security Symposium-2010 - Washington DC, USA Security Analysis
Idle Port Scanning And Non-Interference Analysis Of Network Protocol Stacks Using Model Checking Roya Ensafi , Jong Chun Park , Deepak Kapur , Jedidiah R. Crandall 19th USENIX Security Symposium-2010 - Washington DC, USA Security Analysis
Vulnerability Analysis David Brumley , Edward J. Schwartz , Thanassis Avgerinos 4th USENIX Workshop on Offensive Technologies -2010 - Washington DC, USA Security Analysis
Zero-Sized Heap Allocations Vulnerability Analysis Julien Vanegue 4th USENIX Workshop on Offensive Technologies -2010 - Washington DC, USA Security Analysis
Security That Is Meant To Be Skin Deep: Using Ultraviolet Micropigmentation To Store Emergency-Access Keys For Implantable Medical Devices Stuart Schechter HealthSec-2010 - Washington DC, USA Security Access Analysis
0Box Analyzer: Afterdark Runtime Forensics For Automated Malware Analysis And Clustering Jeremy Chiu DEF CON-18 - Las Vegas, USA Security Analysis Malware Forensics
Coseinc Automated Malware Analysis Lab (Camal) Udi Shamir SyScan-2010 - Singapore Security Analysis Malware
Standing On The Clouds Claudio Criscione SyScan-2010 - Singapore Security Analysis Cloud
An Ria Security Solution - Flash And Pdf Threat Handler Hermes Wang SyScan-2010 - Singapore Security Web Analysis
Low Scuttling Chilli Crab:Network Recon 2010Ad Metlstorm OWASP New Zealand-2010 - New Zealand Security Infrastructure Web Analysis
Security-Assessment.Com - Oh F#!K : What To Do When You Get Pwned Paul Craig OWASP New Zealand-2010 - New Zealand Security Incident Response Computer Forensics Analysis Forensics
Interception And Analysis Of Malicious Traffic Based On Ndis Intermediate Driver Lee Ling Chuan SyScan-2010 - HangZhou, China Security Analysis
Malware Analysis Automation Lab Udi Shamir SyScan-2010 - HangZhou, China Security Analysis
Fireshark Tamas Rudnai HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Security Analysis
Maltego 3 - Start Your Engines Roelof ( RT ) Temmingh HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Security Analysis
How To Rate The Security Of Closed Source Software Michael Thumann HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Security Analysis
Firefox 4 And Opportunities For Security Research Chris Hofmann HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Security Exploitation Analysis
Advanced Malware Analysis Lab Wes Brown HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Security Analysis Malware
Crash Analysis Using Bitblaze Charlie Miller , Noah Johnson Blackhat USA-2010 - Las Vegas, USA Security Analysis
Goodware Drugs For Malware: On-The-Fly Malware Analysis And Containment Damiano Bolzoni , Christiaan Schade Blackhat USA-2010 - Las Vegas, USA Security Analysis Malware
Virt-Ice: Next Generation Debugger For Malware Analysis Quynh Nguyen Anh , Kuniyasu Suzaki Blackhat USA-2010 - Las Vegas, USA Security Analysis Malware
Dirtbox, A Highly Scalable X86/Windows Emulator Georg Wicherski Blackhat USA-2010 - Las Vegas, USA Security Analysis Malware
Hacking Java Clients Stephen de Vries Blackhat USA-2010 - Las Vegas, USA Security Analysis Development Testing
Social Networking Special Ops: Extending Data Visualization Tools For Faster Pwnage Chris Sumner Blackhat USA-2010 - Las Vegas, USA Security Analysis
Balancing The Pwn Trade Deficit Colin Lai , Val Smith Blackhat USA-2010 - Las Vegas, USA Security Community Analysis
Finger Pointing For Fun, Profit And War? Tom Parker Blackhat USA-2010 - Las Vegas, USA Security Analysis Business Forensics
Exploitspotting: Locating Vulnerabilities Out Of Vendor Patches Automatically Jeongwook Oh Blackhat USA-2010 - Las Vegas, USA Security Analysis
Drivesploit: Circumventing Both Automated And Manual Drive-By-Download Detection Wayne Huang , Caleb Sima Blackhat USA-2010 - Las Vegas, USA Security Analysis Malware Browser
Virtually Pwned: Pentesting Virtualization Claudio Criscione Blackhat USA-2010 - Las Vegas, USA Security Analysis
Gathering Information With Google Maximiliano Soler OWASP Argentina-2010 - Argentina Security Web Analysis
The State Of Ssl In The World Michael Boman OWASP Appsec-2010 - Stocholm, Sweden Security Analysis Statistics
The Anatomy Of Real-World Software Security Programs Pravir Chandra OWASP Appsec-2010 - Stocholm, Sweden Security Application Security Analysis
Track Keynote: Breakingpoint Systems – Deep Packet Inspection Richard Favier CCDCOE-2010 - Estonia Security Infrastructure Others Analysis
Agent-Based Modeling And Simulation Of Botnets And Botnet Defense For Homeland Security Igor Kotenko CCDCOE-2010 - Estonia Security Analysis Botnets
Statistics And Trends Of Cybercrime In Mexico Ing Fausto Estrella OWASP Day Mexico-2010 - Mexico Analysis
Surviving The Internet In 2010 Saumil Udayan Shah ITWeb Security Summit-2010 - Johannesburg, South Africa Security Analysis
Change Happens: Building Security With A Business Roadmap Maeson Maherry ITWeb Security Summit-2010 - Johannesburg, South Africa Security Analysis
Cleaning Up Africa As We Join The 21St Century: Botnets And The New Economy Barry Irwin ITWeb Security Summit-2010 - Johannesburg, South Africa Security Analysis
The Nocebo Effect On The Web: An Analysis Of Fake Anti-Virus Distribution Niels Provos , Lucas Ballard , Moheeb Abu Rajab , Panayiotis Mavrommatis , Xin Zhao 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2010 - San Jose, USA Security Analysis
An Uninvited Guest (Who Won'T Go Home) Bill Blunden SOURCE Boston-2010 - Boston, USA Security Analysis
Drinking From The Firehose: Ten Years Of Vulnerabilities Through The Cve Lens, Steven M. Christey SOURCE Boston-2010 - Boston, USA Security Media Analysis
Why The Google Aurora Attack Will Happen Again. How To Analyze Your Defenses And Stay Out Of The Headlines Vikram Phatak SOURCE Boston-2010 - Boston, USA Security Analysis
Targeted Attacks: From Being A Victim To Counter Attacking Andrzej Dereszowski Blackhat Europe-2010 - Barcelona, Spain Security Access Exploitation Analysis
Open Ounce Static Cide Analysis Matt Parson Security B-Sides Austin-2010 - Austin, USA Analysis
Owasp Proxy Rogan Dawes ZaCon-1 - Johannesburg, South Africa Security Web Analysis
The Mechanics Of Ddos Ralfe Poisson ZaCon-1 - Johannesburg, South Africa Security Others Deep Knowledge Analysis
Securing The Core Jee Patterns Rohit Sethi OWASP Appsec-2009 - Washington DC, USA Analysis
The Web Hacking Incidents Database Ryan C. Barnett OWASP Appsec-2009 - Washington DC, USA Web Analysis
Side Channel Analysis On Embedded Systems Job de Haas HITBSecConf Malaysia-2009 - Kuala Lampur, Malaysia Security Analysis
Reil Using Platform-Independent Automated Deobfuscation Sebastian Porst , Christian Ketterer SOURCE Barcelona-2009 - Barcelona, Spain Security Others Analysis
Triaging Bugs With Dynamic Dataflow Analysis Julio Auto SOURCE Barcelona-2009 - Barcelona, Spain Security Analysis
Injecting Sms Messages Into Smart Phones For Security Analysis Charlie Miller , Collin Mulliner 3rd USENIX Workshop on Offensive Technologies -2009 - Montreal, Canada Security Analysis
G.R.L.'S Recent History & Bling Bling Preview Michael Zeltner NinjaCon-2009 - Vienna, Austria Security Analysis
Reverse Engineering By Crayon: Game Changing Hypervisor Based Malware Analysis And Visualization Lorie M. Liebrock DEF CON-17 - Las Vegas, USA Security Analysis Malware
Automated Malware Similarity Analysis Daniel Raygoza DEF CON-17 - Las Vegas, USA Security Analysis Malware
Pla Information Warfare Development Timeline And Nodal Analysis Tk234 DEF CON-17 - Las Vegas, USA Security Analysis Development
Automated Malware Similarity Analysis Daniel Raygoza Blackhat USA-2009 - Las Vegas, USA Security Analysis Malware
Reverse Engineering By Crayon: Game Changing Hypervisor Based Malware Analysis And Visualization Lorie M. Liebrock , Danny Quist Blackhat USA-2009 - Las Vegas, USA Security Analysis Malware
Web Applications And Database – A Security Analysis Frank Fan SyScan-2009 - Hong Kong, China Security Web Analysis
Microsoft Products' Vulnerabilities - Then, Now And The Future Kostya Kortchinsky SyScan-2009 - Hong Kong, China Security Analysis Development
Microsoft Products' Vulnerabilities - Then, Now And The Future Microsoft Then , Now Future SyScan-2009 - Shanghai, China Security Analysis Development
Malware Analysis Christopher Kruegel 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2009 - Boston, USA Security Analysis Malware
Malware Analysis Methodology Thorsten Holz 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2009 - Boston, USA Security Analysis Malware
Cutting Through The Hype: An Analysis Of Application Testing Methodologies Jon Miller , Alex Wheeler , David Bonvillian , Neel Mehta Blackhat Europe-2009 - Barcelona, Spain Security Analysis Testing
Software Reverse Engineering With The Leaf Framework Chris Brown CarolinaCon-5 - Raleigh, USA Security Analysis
Anti-Debugging - A Developers Perspective Txs CarolinaCon-5 - Raleigh, USA Security Access Analysis Malware Development
The Security Assessment Methodology Kellep Charles (kc) CarolinaCon-5 - Raleigh, USA Security Analysis
Anti-Debugging - A Developer'S Viewpoint Tyler ( Txs ) Shields SOURCE Boston-2009 - Boston, USA Security Access Analysis Malware Development
Splunk Robert Fox SOURCE Boston-2009 - Boston, USA Security Analysis Business Compliance
400 Apps In 40 Days Sahba Kazerooni SOURCE Boston-2009 - Boston, USA Security Risk Analysis
Blinded By Flash: Widespread Security Risks Flash Developers Dont See Prajakta Jagdale ShmooCon-2009 - Washington DC, USA Security Web Analysis Development
Short Attention Span Security Ben Kurtz Chaos Communication Congress-25 - Berlin, Germany Security Analysis
Analyzing Rfid Security Henryk Plötz Chaos Communication Congress-25 - Berlin, Germany Security Analysis
All Your Base(S) Are Belong To Us Magnus Manske Chaos Communication Congress-25 - Berlin, Germany Security Analysis
Squeezing Attack Traces Markus Kötter Chaos Communication Congress-25 - Berlin, Germany Security Analysis
Vulnerability Discovery In Encrypted Closed Source Php Applications Stefan Esser Chaos Communication Congress-25 - Berlin, Germany Security Analysis
Cracking The Msp430 Bsl Travis Goodspeed Chaos Communication Congress-25 - Berlin, Germany Security Analysis
Analysis And Visualization Of Common Packers Ero ( Ertia ) Carrera HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Analysis
Decompilers And Beyond Ilfak Guilfanov HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Analysis
An Effective Methodology To Enable Security Evaluation At Rtl Level And Automate Vulnerability Detection In Future Hardware Mary Yeoh HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Analysis Development Testing
How The Leopard Hides His Spots - Os X Anti-Forensics Techniques The Grugq HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Analysis Testing
Malware Detection Through Network Flow Analysis Bruce Potter DEF CON-16 - Las Vegas, USA Security Analysis Malware
Malware Detection Through Network Flow Analysis Bruce Potter Blackhat USA-2008 - Las Vegas, USA Security Analysis Malware
Circumventing Automated Javascript Analysis Tools Billy Hoffman Blackhat USA-2008 - Las Vegas, USA Security Analysis
Visual Forensic Analysis And Reverse Engineering Of Binary Data Greg Conti , Erik Dean Blackhat USA-2008 - Las Vegas, USA Security Analysis
Smartcard Apdu Analysis Ivan Buetler Blackhat USA-2008 - Las Vegas, USA Security Analysis
Botminer: Clustering Analysis Of Network Traffic For Protocol- And Structure-Independent Botnet Detection Roberto Perdisci , Wenke Lee , Guofei Gu , Junjie Zhang 17th USENIX Security Symposium-2008 - San Jose, USA Security Analysis
Security Analysis Of Network Protocols John C. Mitchell 17th USENIX Security Symposium-2008 - San Jose, USA Security Analysis
Panalyst: Privacy-Aware Remote Error Analysis On Commodity Software Xiaofeng Wang , Rui Wang , Zhuowei Li 17th USENIX Security Symposium-2008 - San Jose, USA Security Analysis
There Is No Free Phish: An Analysis Of Free And Live Phishing Kits Christopher Kruegel , Giovanni Vigna , Marco Cova 2nd USENIX Workshop on Offensive Technologies-2008 - San Jose, USA Security Analysis Phishing
Hacking Democracy: An In Depth Analysis Of The Es&S Voting Systems Sandy Clark , Matt Blaze , Eric Cronin , Gaurav Shah , Micah Sherr , Pavol Cerny , Adam Aviv The Last HOPE-2008 - USA Security Analysis
Introduction To Mcu Firmware Analysis And Modification With Msp430Static Travis Goodspeed The Last HOPE-2008 - USA Security Analysis
A Convergence Of Communities John Strauchs The Last HOPE-2008 - USA Security Analysis
Methods Of Copying High Security Keys Barry Wels , Han Fey The Last HOPE-2008 - USA Security Analysis
Crimeware Forensics Analysis Using Toolmarks Birdman SyScan-2008 - Taipei, Taiwan Security Analysis Forensics
Side Channel Analysis Job De haas TROOPERS-2008 - Munich, German Analysis
Criminal Hackertools According To § 202C Stgb Horst Speichert TROOPERS-2008 - Munich, German Security Analysis Legal Testing
Side Channel Analysis On Embedded Systems. Impact And Countermeasures Job Dehaas Blackhat Europe-2008 - Amsterdam, The Netherlands Security Analysis
Content Awareness – A Cornerstone To Data Protection John Amaral SOURCE Boston-2008 - Boston, USA Security Access Risk Analysis Business
Forensic Image Analysis For Password Recovery David C. Smith ShmooCon-2008 - Washington DC, USA Security Analysis
Climbing Everest: An Inside Look At Voting Systems Used By The State Of Ohio Sandy Clark , Eric Cronin , Gaurav Shah , Micah Sherr , Pavol Cerny , Adam Aviv , Matt Blaze ShmooCon-2008 - Washington DC, USA Security Infrastructure Analysis
The Geek And The Gumshoe Or Can Mathematics And Computers Really Solve Crimes? Michael Thornton ShmooCon-2008 - Washington DC, USA Security Wireless Analysis
Analysis Of Sputnik Data From 23C3 Tomasz Rybak Chaos Communication Congress-24 - Berlin, Germany Security Analysis
I Know Who You Clicked Last Summer Svenja Schröder Chaos Communication Congress-24 - Berlin, Germany Security Community Analysis
Advanced Web Application And Database Threat Analysis With Matrixay Frank Yuan Fan HITBSecConf Malaysia-2007 - Kuala Lampur, Malaysia Security Web Analysis
Enterprise Hacking: Who Needs Exploit Codes? Fetri Miftach HITBSecConf Malaysia-2007 - Kuala Lampur, Malaysia Security Access Risk Analysis Business Development
High Security Locks - Illusion Or Reality? Marc Weber Tobias HITBSecConf Malaysia-2007 - Kuala Lampur, Malaysia Security Analysis
Insider Threat Visualization Raffael Marty HITBSecConf Malaysia-2007 - Kuala Lampur, Malaysia Security Analysis Compliance Automation
Analysis Hao Chen 16th USENIX Security Symposium-2007 - Boston, USA Security Analysis
How To Obtain And Assert Composable Security Ibm Research , Ran Canetti 16th USENIX Security Symposium-2007 - Boston, USA Security Analysis
Caffeinemonkey: Automated Collection, Detection And Analysis Of Malicious Javascript Daniel Peck , Ben Feinstein DEF CON-15 - Las Vegas, USA Security Analysis
Satellite Imagery Analysis Greg Conti DEF CON-15 - Las Vegas, USA Security Analysis
Attack Surface Analysis Of Blackberry Devices James O'connor SyScan-2007 - Singapore Security Analysis
The Security Analytics Project: Alternatives In Analysis Mark Talabis Blackhat USA-2007 - Las Vegas, USA Security Analysis
Vista Network Attack Surface Analysis And Teredo Security Implications Jim Hoagland Blackhat USA-2007 - Las Vegas, USA Security Analysis
Caffeinemonkey: Automated Collection, Detection And Analysis Of Malicious Javascript Daniel Peck Blackhat USA-2007 - Las Vegas, USA Security Analysis
Pisa: Protocol Identification Via Statistical Analysis Rob King Blackhat USA-2007 - Las Vegas, USA Security Analysis
Reversing C++ Paul Vincent Sabanal Blackhat USA-2007 - Las Vegas, USA Security Analysis Malware
Pyemu: A Multi-Purpose Scriptable X86 Emulator Cody Pierce Blackhat USA-2007 - Las Vegas, USA Security Analysis Malware Development
Traffic Analysis—The Most Powerful And Least Understood Attack Methods Nick Matthewson Blackhat USA-2007 - Las Vegas, USA Security Analysis
Simple Entropy-Based Heuristics For Log And Traffic Analysis Sergey Bratus ShmooCon-2007 - Washington DC, USA Security Analysis
Encrypted Protocol Identification Via Statistical Analysis Rob King , Rohit Dhamankar ShmooCon-2007 - Washington DC, USA Security Analysis
Home-Grown Crypto (Aka Taking A Shiv To A Gun Fight) Hank Leininger , Klayton Monroe ShmooCon-2007 - Washington DC, USA Security Infrastructure Analysis
Extensible 802.11 Packet Flinging Mike Kershaw , Joshua Wright ShmooCon-2007 - Washington DC, USA Security Wireless Analysis Testing
An Introduction To Traffic Analysis George Danezis Chaos Communication Congress-23 - Berlin, Germany Security Analysis
Analysis Of A Strong Random Number Generator Thomas Biege Chaos Communication Congress-23 - Berlin, Germany Security Analysis
Avit≫C23: 3L ('Thrill') Vj Software Visual Berlin Chaos Communication Congress-23 - Berlin, Germany Security Analysis
Advanced Attacks Against Pocketpc Phones Collin Mulliner Chaos Communication Congress-23 - Berlin, Germany Security Analysis
Automated Botnet Detection And Mitigation Georg 'oxff' Wicherski Chaos Communication Congress-23 - Berlin, Germany Security Analysis Malware
Mining Search Queries Robert Auger Chaos Communication Congress-23 - Berlin, Germany Security Analysis
A New Approach To Cybercrime: The Hacker’S Profiling Project (Hpp) Raoul "Nobody" Chiesa HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Panel Analysis
Security Engineering In Windows Vista Ian Hellen HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Infrastructure Community Risk Analysis
Client Honeypots - It’S Not Only The Network Michael L. Davis HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Web Monitoring Community Analysis Malware
Firefox Security Window Snyder HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Web Analysis
Triple Play; Triple Threat? — Iptv Security Yen Ming Chen HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Analysis Business
Pentesting Java/J2Ee - Discovering Remote Holes Marc Schönefeld HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Analysis Business
Presentation Title: Carlos Sarraute HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Analysis Cryptography
Voiphreaking: Siphallis Unveiled The Grugq HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Analysis Testing
Things That Go Bump In The Night: An Analysis Of Current And Emerging Threats To Physical Security Marc Weber Tobias , Matt Fiddler DEF CON-14 - Las Vegas, USA Security Analysis
Visual Log Analysis - The Beauty Of Graphs Raffael Marty DEF CON-14 - Las Vegas, USA Security Analysis
Samael (Secure, Anonymous, Megalomaniacal, Autonomous, Encrypting Linux) And Narc (Network Analysis Reporting Console) Atlas , Dr.kaos , Arcon , Beth Louis (phen) , Digunix DEF CON-14 - Las Vegas, USA Security Analysis
Traffic Analysis Panel Jon Callas DEF CON-14 - Las Vegas, USA Security Panel Analysis
Selling Security To Software Developers: Lessons Learned While Building A Commercial Static Analysis Tool Brian Chess 15th USENIX Security Symposium-2006 - Vancouver, Canada Security Analysis
Static Analysis For Security David A. Wagner 15th USENIX Security Symposium-2006 - Vancouver, Canada Security Analysis
Rule-Based Static Analysis Of Network Protocol Implementations Jeffrey S. Foster , Octavian Udrea , Cristian Lumezanu 15th USENIX Security Symposium-2006 - Vancouver, Canada Security Analysis
Dynamic Application-Layer Protocol Analysis For Network Intrusion Detection Vern Paxson , Holger Dreger , Anja Feldmann , Michael Mai , Robin Sommer 15th USENIX Security Symposium-2006 - Vancouver, Canada Security Analysis
Low Level Firmware Analysis And Hacking John Maushammer HOPE Number 6-2006 - USA Security Analysis
Basics Of Forensic Recovery Kall Loper HOPE Number 6-2006 - USA Security Analysis
Constructing Cryptographic Protocols J Salvatore Testa II HOPE Number 6-2006 - USA Security Analysis
Making Reliable Links Using Wifi Catonic Cinotac HOPE Number 6-2006 - USA Security Analysis
Are You Sure Phone Banking Is Safe? Marek Bialoglowy SyScan-2006 - Singapore Security Analysis
Raide: Rootkit Analysis Identification Elimination Jamie Butler Blackhat Europe-2006 - Amsterdam, The Netherlands Security Analysis
Anomaly Detection Through System Call Argument Analysis Stefano Zanero Blackhat Europe-2006 - Amsterdam, The Netherlands Security Analysis
How To Automatically Sandbox Iis With Zero False Positive And Negative Tzi-cker Chiueh Blackhat Europe-2006 - Amsterdam, The Netherlands Security Infrastructure Monitoring Analysis Business
Behavioral Malware Analysis Using Sandnets (Build It!) Joe Stewart ShmooCon-2006 - Washington DC, USA Security Analysis Malware
The Church Of Wi-Fi Presents: An Evil Bastard, A Rainbow And A Great Dane! (Break It!) Renderman , Thorn & H1kari , Dutch , Joshua Wright ShmooCon-2006 - Washington DC, USA Security Wireless Community Analysis Forensics
Voip Wifi Phone Security Analysis (Break It!) Shawn Merdinger ShmooCon-2006 - Washington DC, USA Security Analysis
Covert Channels In Tcp/Ip: Attack And Defence Steven J. Murdoch Chaos Communication Congress-22 - Berlin, Germany Security Analysis
Hopalong Casualty Ingo Lütkebohle Chaos Communication Congress-22 - Berlin, Germany Security Analysis
Security Analysis Of A Cryptographically-Enabled Rfid Device Aviel D. Rubin , Ari Juels , Adam Stubblefield , Steve Bono , Matthew Green , Michael Szydlo 14th USENIX Security Symposium-2005 - Baltimore, USA Security Analysis
Automating Mimicry Attacks Using Static Binary Analysis Christopher Kruegel , Giovanni Vigna , William Robertson , Engin Kirda , Darren Mutz 14th USENIX Security Symposium-2005 - Baltimore, USA Security Analysis
Finding Security Vulnerabilities In Java Applications With Static Analysis V. Benjamin Livshits , Monica S. Lam 14th USENIX Security Symposium-2005 - Baltimore, USA Security Analysis
Human-Computer Interaction Opportunities For Improving Security Ben Shneiderman 14th USENIX Security Symposium-2005 - Baltimore, USA Security Monitoring Analysis Development
Electronic Voting In The United States: An Update Aviel D. Rubin 14th USENIX Security Symposium-2005 - Baltimore, USA Security Analysis
Analysis Of Identity Creation Detection Schemes Post- 9/11 Cerebus DEF CON-13 - Las Vegas, USA Security Analysis
Visual Security Event Analysis Raffael Marty DEF CON-13 - Las Vegas, USA Security Analysis
The Speed Of (In)Security: Analysis Of The Speed Of Security Vs. Insecurity Martin May Blackhat USA-2005 - Las Vegas, USA Security Analysis
Raide: Rootkit Analysis Identification Elimination V1.0 Peter SilbermanJamie Butler Blackhat USA-2005 - Las Vegas, USA Security Analysis
The Art Of Defiling: Defeating Forensic Analysis The Grugq Blackhat USA-2005 - Las Vegas, USA Security Analysis
Beyond Ethereal: Crafting A Tivo For Security Datastreams Greg Conti Blackhat USA-2005 - Las Vegas, USA Security Analysis
[ Back-Up Speaker ]Reverse Engineering Network Protocols Using Bioinformatics Marshall Beddoe Blackhat USA-2005 - Las Vegas, USA Security Analysis
The Art Of Defiling: Defeating Forensic Analysis The Grugq Blackhat Europe-2005 - Amsterdam, The Netherlands Security Analysis
Symbian Security Job de Haas Blackhat Europe-2005 - Amsterdam, The Netherlands Security Analysis
If Yore Not Part Of The Solution, Yore Part Of The Precipitate Bof Jon Callas ShmooCon-2005 - Washington DC, USA Security Analysis
Frustrating Automated Static Analysis Of Binaries Pusscat ShmooCon-2005 - Washington DC, USA Analysis
Binary Difference Analysis Via Phase Cancellation Joe Stewart , Mike Wisener ShmooCon-2005 - Washington DC, USA Security Analysis
Side Channel Analysis Of Smart Cards Dirk Feldhusen , Matthias Heuft Chaos Communication Congress-21 - Berlin, Germany Security Analysis
How To Herd Cats Druid Chaos Communication Congress-21 - Berlin, Germany Security Analysis Development
Machine Learning In Science And Engineering Gunnar Rätsch Chaos Communication Congress-21 - Berlin, Germany Security Analysis
The Art Of Defiling: Defeating Forensic Analysis On Unix File Systems The Grugg SyScan-2004 - Singapore Security Analysis Unix
Netflow Based Network Security Analysis Yann Berthier SyScan-2004 - Singapore Security Analysis
Fighting Computer Virus Attacks Peter Szor 13th USENIX Security Symposium-2004 - San Diego, USA Security Analysis
Security Through Automated Binary Analysis Weld Pond , Dildog The Fifth HOPE -2004 - USA Security Analysis
Frustrating Os Fingerprinting With Morph Kathy Wang The Fifth HOPE -2004 - USA Security Analysis
How To Send Encrypted Email Joshua Teitelbaum The Fifth HOPE -2004 - USA Security Analysis
Putting The P Back In Vpn: An Overlay Network To Resist Traffic Analysis Roger Dingledine Blackhat USA-2004 - Las Vegas, USA Security Analysis
Worldwide Wardrive 4: An Analysis Of Wireless Security Trends Chris Roamer Blackhat USA-2004 - Las Vegas, USA Security Wireless Analysis
Managing Election Data: The California Recall Bev Harris Blackhat USA-2004 - Las Vegas, USA Security Analysis Legal
The Black Hat Surveys Larry Ponemon Blackhat USA-2004 - Las Vegas, USA Security Privacy Community Analysis
The Art Of Defiling: Defeating Forensic Analysis On Unix File Systems The Grugq Blackhat Europe-2004 - Amsterdam, The Netherlands Security Analysis Unix
The Art Of Defiling: Defeating Forensic Analysis On Unix File Systems The Grugq HITBSecConf Malaysia-2004 - Kuala Lampur, Malaysia Security Analysis Unix
Security Tools Integration Framework (Stif) Fyodor Yarochkin HITBSecConf Malaysia-2004 - Kuala Lampur, Malaysia Security Analysis
Static Analysis Of Executables To Detect Malicious Patterns Somesh Jha , Mihai Christodorescu 12th USENIX Security Symposium-2003 - Washington DC, USA Security Analysis
Ddos Mitigation And Analysis At The Infrastructure Level Nicolas Fischbach Blackhat Europe-2003 - Amsterdam, The Netherlands Security Infrastructure Analysis
Data Flow Analysis Thomas ( Halvar Flake ) Dullien Blackhat Europe-2003 - Amsterdam, The Netherlands Security Analysis
Security Analysis Of Microsoft Encrypted File System (Efs) Andrey Malyshev , Serg Vasilenkov Blackhat Europe-2003 - Amsterdam, The Netherlands Security Analysis
Using Cqual For Static Analysis Of Authorization Hook Placement Xiaolan (Catherine) Zhang , Antony Edwards , Trent Jaeger 11th USENIX Security Symposium-2002 - San Francisco, USA Security Analysis
The Argument Against Security Through Obscurity For The Non-Digital World Greg Newby H2K2-2002 - USA Security Risk Analysis
Hacking Nanotech Anonymous H2K2-2002 - USA Security Analysis
Traffic Analysis Of Encrypted Web Traffic George N. Dafermos Chaos Communication Congress-18 - Berlin, Germany Security Web Analysis
Kernel Level Vulnerabilities Exploitation: Behind The Scenes Of The 5Th Argus Hacking Contest LSD Blackhat Europe-2001 - Amsterdam, The Netherlands Security Exploitation Analysis
Decoding And Understanding Internet Worms Dale Coddington , Ryan Permeh Blackhat Europe-2001 - Amsterdam, The Netherlands Security Exploitation Reverse Engineering Analysis Malware
Timing Analysis Of Keystrokes And Timing Attacks On Ssh Dawn Xiaodong Song , Xuqing Tian , David A. Wagner 10th USENIX Security Symposium-2001 - Washington DC, USA Security Analysis
Security Analysis Of The Palm Operating System And Its Weaknesses Against Malicious Code Threats Hobbit , Joe ( Kingpin ) Grand , Peiter ( Mudge ) Zatko 10th USENIX Security Symposium-2001 - Washington DC, USA Security Analysis
Designing Against Traffic Analysis Paul Syverson 10th USENIX Security Symposium-2001 - Washington DC, USA Security Analysis Network
Analysis Of The Intel Pentium'S Ability To Support A Secure Virtual Machine Monitor John Scott Robin , Cynthia E. Irvine 9th USENIX Security Symposium-2000 - Denver, USA Security Analysis
System Profiling: Target Analysis Or How Crackers Find You Daremoe DEF CON-08 - Las Vegas, USA Security Analysis
Chop Up An Appetite Or: Real Hackers Don T Eat Hot Pizza Andreas Steinhauser Chaos Communication Congress-16 - Berlin, Germany Security Analysis
The Design And Analysis Of Graphical Passwords Ian Jermyn , Alain Mayer , Fabian Monrose 8th USENIX Security Symposium-1999 - Washington DC, USA Security Analysis
Introduction To Cyber Forensic Analysis Peter Stephenson Blackhat USA-1999 - Las Vegas, USA Security Analysis
Building A Forensic Toolkit That Will Protect You From Evil Influences Dominique Brezinski Blackhat USA-1999 - Las Vegas, USA Security Analysis
Firewalk Mike ( Route ) D. Schiffman Blackhat USA-1999 - Las Vegas, USA Security Analysis
Statistical Analysis Of Reusable Passwords And Recommendations. Bruce K. Marshall Blackhat USA-1998 - Las Vegas, USA Security Analysis
Finite-State Analysis Of Ssl 3.0 John C. Mitchell , Vitaly Shmatikov , Ulrich Stern 7th USENIX Security Symposium-1998 - San Antonio, USA Security Analysis SSL