Title |
Conference |
Tags |
Locknote: Conclusions and Key Takeaways from Day 1 |
BlackHatEurope-2020 - Virtual, Virtual |
|
OTRazor: Static Code Analysis for Vulnerability Discovery in Industrial Automation Scripts |
BlackHatUSA2020-2020 - Las Vegas, USA |
|
Radio and Hardware Security Testing for Human Beings |
NoHat2019-2019 - Bergamo, Italy |
|
When Machines Can't Talk: Security and Privacy Issues of Machine-to-Machine Data Protocols |
blackhatEurope-2018 - London, United Kingdom |
|
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery |
woot-2017 - vancouver,canada |
|
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing |
woot-2017 - vancouver,canada |
|
BREAKING THE LAWS OF ROBOTICS: ATTACKING INDUSTRIAL ROBOTS |
blackhat-2017 - las vegas,usa |
|
SHIELDFS: THE LAST WORD IN RANSOMWARE RESILIENT FILE SYSTEMS |
blackhat-2017 - las vegas,usa |
|
Talking Behind Your Back |
CCC-2016 - hamburg,germany |
|
POCKET-SIZED BADNESS: WHY RANSOMWARE COMES AS A PLOT TWIST IN THE CAT-MOUSE GAME |
BlackHatEU-2016 - London,uk |
|
TALKING BEHIND YOUR BACK: ATTACKS AND COUNTERMEASURES OF ULTRASONIC CROSS-DEVICE TRACKING |
BlackHatEU-2016 - London,uk |
|
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications |
ACSAC-2015 - los angeles,usa |
|
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries, |
Dimva-2015 - Milan,Italy |
|
Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software, |
Dimva-2015 - Milan,Italy |
|
Face in the Distorting Mirror: Revisiting Photo-based Social Authentication |
CCS-2014 - Scottsdale,USA |
|
Zarathustra: Extracting WebInject Signatures from Banking Trojans |
PST-2014 - Toronto,Canada |
|
AndRadar: Fast Discovery of Android Applications in Alternative Markets |
Dimva-2014 - London,UK |
|
Phoenix: DGA-based Botnet Tracking and Intelligence |
Dimva-2014 - London,UK |
|
BankSealer: An Online Banking Fraud Analysis and Decision Support System |
ifip-2014 - Marrakech,Morroco |
|
BitIodine: Extracting Intelligence from the Bitcoin Network |
FinanCryptandInfoSec-2014 - Accra,Barbados |
|
A Comprehensive Black-box Methodology for Testing the Forensic Characteristics of Solid-state Drives |
ACSAC-2013 - New Orleans, USA |
|
iSnoop: How to Steal Secrets From Touchscreen Devices |
BlackHatAbuDhabi-2011 - Emirates Palace, Abu Dhabi |
|
Integrated Detection Of Attacks Against Browsers, Web Applications And Databases
|
EC2ND-2009 - Germany |
Security
|