Title |
Speakers |
Summary |
Topic Types |
Engineering Heap Overflow Exploits With Javascript |
Charlie Miller
,
Mark Daniel
,
Jacob Honoroff
|
None |
Security
|
Experiences With Model Inference Assisted Fuzzing |
Joachim Viide
,
Aki Helin
,
Marko Laakso
,
Pekka Pietik‰inen
,
Mika Sepponen
,
Kimmo Halunen
,
Rauli Puuper‰
,
Juha Rˆning
|
None |
Security
Fuzzing
|
Insecure Context Switching: Inoculating Regular Expressions For Survivability |
Will Ormandy
|
None |
Security
|
There Is No Free Phish: An Analysis Of Free And Live Phishing Kits |
Christopher Kruegel
,
Giovanni Vigna
,
Marco Cova
|
None |
Security
Analysis
Phishing
|
Towards Systematic Evaluation Of The Evadability Of Bot/Botnet Detection Methods |
John C. Mitchell
,
Elizabeth Stinson
|
None |
Security
|
Reverse Engineering Python Applications |
Aaron Portnoy
,
Ali-rizvi Santiago
|
None |
Security
|
Exploitable Redirects On The Web: Identification, Prevalence, And Defense |
Craig A. Shue
,
Andrew J. Kalafut
,
Minaxi Gupta
|
None |
Security
|
Modeling The Trust Boundaries Created By Securable Objects |
Matt Miller
|
None |
Security
|