Title Speakers Conference Tags
Hunting Asynchronous Vulnerabilities James Kettle 44con-2015 - London,UK Attack
Breaking Anti-Virus Software Joxean Koret Syscan-2014 - Merchant Court,Singapore Attack
Car Hacking for Poories Chris Valasek , Charlie Miller Syscan-2014 - Merchant Court,Singapore Attack
Deep-Submicron Backdoor Alfredo Ortega Syscan-2014 - Merchant Court,Singapore Attack
Cracking And Analyzing Apple iCloud Protocols: iCloud Backups, Find My iPhone, Document Storage. Vladimir Katalov DeepSec-2013 - Vienna,Austria Computer Forensics Attack iCloud
The Security of MDM (Mobile Device Management) systems S\xc3\xa9bastien Andrivet hackinparis-2013 - Paris,France Attack Mobile Security Mobile Device Management
Plunder, Pillage and Print Deral Heiland BSidesBoston-2013 - Boston,USA Attack Embedded Tool
9600 8N1, Root Shell Drive, Serial City, USA Hd Moore InfoSec SouthWest-2013 - Austin,USA Attack Survey Port Scanning ADDP Serial Device
Keynote Chris Eagle Infiltrate-2013 - Miami, USA Keynote Attack Attack Planning Military
Hacking Appliances: Ironic exploitation of security products Ben Williams BlackHat EU-2013 - Amsterdam, Netherlands Attack Appliance
The Sandbox Roulette - Are you ready for the gamble? Rahul Kashyap , Rafal Wojtczuk BlackHat EU-2013 - Amsterdam, Netherlands Introductory Attack Sandbox
Evil Maid Just Got Angrier: Why Full-Disk Encryption With TPM is Insecure on Many Systems Yuriy Bulygin CanSecWest-2013 - Vancouver, Canada Attack Bootkit UEFI Full disk encryption
Reflecting on Reflection - Exploiting Reflection Vulnerabilities in Managed Languages James Forshaw CanSecWest-2013 - Vancouver, Canada Attack Reflection
Desktop Insecurity Ilja van Sprundel , Shane "k2" Macaulay CanSecWest-2013 - Vancouver, Canada Attack Linux
Godel's Gourd - Fuzzing for Logic Issues Mike "dd" Eddington CanSecWest-2013 - Vancouver, Canada Fuzzing Attack
Sandbox Escapes: When the Broker is Broken Peter Vreugdenhil CanSecWest-2013 - Vancouver, Canada Attack Sandbox Adobe
Hide And Seek, Post-Exploitation Style Tim Tomes , TJ O'Connor Shmoocon-2013 - Washington,USA Attack Tool Geolocation
Time is NOT on your Side Sebastian Schinzel Chaos Communication Congress-29 - Hamburg, Germany Web Security Attack Timing Attacks
Security Evaluation of Russian GOST Cipher Nicolas T Courtois Chaos Communication Congress-29 - Hamburg, Germany Cryptography Attack GOST
Hacking Cisco Phones Ang Cui , Michael Costello Chaos Communication Congress-29 - Hamburg, Germany Incident Response Attack VOIP Cisco Embedded
SCADA Strangelove Sergey Gordeychik , Denis Baranov , Gleb Gritsai Chaos Communication Congress-29 - Hamburg, Germany Attack SCADA
DROID EXPLOITATION SAGA Subho Halder , Aditya Gupta Blackhat Abu Dhabi-2012 - Abu Dhabi, UAE Android Attack
POWER ANALYSIS ATTACKS FOR CHEAPSKATES "colin O'flynn" Blackhat Abu Dhabi-2012 - Abu Dhabi, UAE Cryptography Attack Differential Power Analysis
HTML5 TOP 10 THREATS STEALTH ATTACKS AND SILENT EXPLOITS Shreeraj Shah Blackhat Abu Dhabi-2012 - Abu Dhabi, UAE Attack HTML5
BREAKING AND FIXING THE SMART GRID Justin Searle Blackhat Abu Dhabi-2012 - Abu Dhabi, UAE Attack Critical Infrastructure
UI REDRESSING ATTACKS ON ANDROID DEVICES Marcus Niemietz Blackhat Abu Dhabi-2012 - Abu Dhabi, UAE Android Attack Defence Tapjacking
VMDK Hast Left The Building -- Attacking VMware-Based Cloud Infrastructures Daniel Mende , Matthias Luft , Pascal Turbing Deepsec-2012 - Vienna, Austria Attack VMWare
Hacking the NFC credit cards for fun and debit ;) Renaud Lifchitz Deepsec-2012 - Vienna, Austria Attack NFC
Windows Kernel Reference Count Vulnerabilities Case Study Mateusz ( j00ru ) Jurczyk ZeroNights-2012 - Moscow, Russia Attack Kernel Windows Reference Counting
Attacking Audio One Time Passwords at 1100Hz Graeme Neilson , Shingirayi Padya Kiwicon-2012 - Wellington, New Zealand Attack Voicemail AOTP
Binary art: Byteing the PE that fails you Ange ( ange4771 ) Albertini Hashdays-2012 - Lucerne,Switzerland Attack Windows PE
REVERSE ENGINEERING A MASS TRANSIT TICKETING SYSTEM Trainhack Ruxcon-2012 - Melbourne, Australia Reverse Engineering Cryptography Attack
PRACTICAL ATTACKS ON PAYMENT GATEWAYS Eldar Marcussen Ruxcon-2012 - Melbourne, Australia Web Security Attack Payment Gateway
Innovative Approaches to Exploit Delivery Saumil Udayan Shah HITBSecConf Malaysia-2012 - KL, Malaysia Exploitation Web Security Attack
Hacking Huawei VRP Felix ( FX ) Lindner HITBSecConf Malaysia-2012 - KL, Malaysia Network Penetration Attack Huawei
Practical Exploitation of Embedded Systems Andrea Barisani , Daniele Bianco HITBSecConf Malaysia-2012 - KL, Malaysia Reverse Engineering Attack Embedded
6000 Ways and More: A 15 Year Perspective on Why Telcos Keep Getting Hacked Philippe Langlois , Emmanuel Gadaix HITBSecConf Malaysia-2012 - KL, Malaysia Attack Mobile Security Network Protocols
IPv6 Insecurity Revolu4ons Marc Heuse HITBSecConf Malaysia-2012 - KL, Malaysia IPv6 Attack
PRNG: PWNING RANDOM NUMBER GENERATORS (IN PHP APPLICATIONS) George Argyros , Aggelos Kiayias BlackHat USA-2012 - Las Vegas, USA Attack PHP Random Functions Entropy
EXPLOITING THE JEMALLOC MEMORY ALLOCATOR: OWNING FIREFOX'S HEAP Chariton Karamitas , Patroklos Argyroudis BlackHat USA-2012 - Las Vegas, USA Attack Heap Overflows Jemalloc
My Arduino can beat up your hotel room lock Cody Brocious BlackHat USA-2012 - Las Vegas, USA Attack Hardware Hacking
Don't stand so close to me: an analysis of the NFC attack surface Charlie Miller BlackHat USA-2012 - Las Vegas, USA Attack NFC
W32.Duqu: The Precursor to the Next Stuxnet Eric Chien , Liam Omurchu , Nicolas Falliere 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats-2012 - San Francisco, USA Duqu Attack