ConCollector
our blog
|
more on thinkst
Search:
Everything
Browse:
Speakers
Conferences
Topics
Contributors
Analytics
Folklore
About
Login
CanSecWest 2013
March 6, 2013 to March 8, 2013, Vancouver, Canada
Event Page
Tell us about missing data
Title
Speakers
Summary
Topic Types
Keynote
Peiter "mudge" Zatko
N/A
Security
iOS6.1 - Exploitation 280 Days Later
Stephan Esser
N/A
Security
Evil Maid Just Got Angrier: Why Full-Disk Encryption With TPM is Insecure on Many Systems
Yuriy Bulygin
N/A
Attack
IncludeThinkstScapes
Bootkit
UEFI
Full disk encryption
Sandbox Escapes: When the Broker is Broken
Peter Vreugdenhil
N/A
Attack
IncludeThinkstScapes
Sandbox
Adobe
Reflecting on Reflection - Exploiting Reflection Vulnerabilities in Managed Languages
James Forshaw
N/A
Attack
IncludeThinkstScapes
Reflection
An Android Hacker's Journey: Challenges in Android Security Research
Joshua J Drake
N/A
Android
Introductory
IncludeThinkstScapes
Physical Privilege Escalation and Mitigation in the x86 World
Oded Horovitz
,
Steve Weis
N/A
The Most Unusual APT
Ryan Mcgeehan
,
Chad Greene
N/A
DEP/ASLR bypass without ROP/JIT
Yu Yang
N/A
Security
SMS to Meterpreter - Fuzzing USB Modems
Rahul Sasi
N/A
Security
Cracking and Analyzing Apple iCloud backups, Find My iPhone, Document Storage.
Vladimir Katalov
N/A
Security
Desktop Insecurity
Ilja van Sprundel
,
Shane "k2" Macaulay
N/A
Attack
IncludeThinkstScapes
Linux
Shining Some Light on the Evolution of BlackHole
Chris Astacio
N/A
Project 53
Dan Hubbard
N/A
Security
Smart TV Security
Seungjin Lee
N/A
Security
Godel's Gourd - Fuzzing for Logic Issues
Mike "dd" Eddington
N/A
Fuzzing
Attack
IncludeThinkstScapes
MS SQL Post Exploitation Shenanigans: You're In, Now What?
Rob Beck
N/A
Security
Analysis of a Windows Kernel Vulnerability; From Espionage to Criminal Use
Julia Wolf
N/A
Security