Star 0


Title Humans
Welcome To Rootkit Country
iPhone and iPad Hacking Ilja van Sprundel , IOActive, Inc.
Dymanic Cryptographic Trapdoors Eric Filiol
Network Application Firewalls vs. Contemporary Threats Brad Woodberg
GRAPE: Generative Rule-based Generic Stateful Fuzzing
Security Defect Metrics for Targeted Fuzzing Matt Miller , David Weston , Microsoft Corporation
A Castle Made of Sand: Adobe Reader X Sandbox Richard Johnson
SMS-o-Death: From Analyzing To Attacking Mobile Phones on a Large Scale Collin Mulliner , Nico Golde
Borken Fonts: The Story of Naive Parsers and Attacker Controlled Reboots Red Hat
Understanding and Exploiting Flash ActionScript Vulnerabilities Haifei Li , Fortinet, Inc.
Showing How Security Has (And Hasn't) Improved, After Ten Years Of Trying
The Law of Web Application Hacking Marcia Hofmann , EFF
Black Box Auditing Adobe Shockwave
Stale Pointers Are The New Black Vincenzo Iozzo
Deconstructing ColdFusion Veracode
Chip & PIN is Definitely Broken Andrea Barisani , Daniele Bianco
Project Ubertooth: Building a Better Bluetooth Adapter Michael Ossmann , Great Scott Gadgets
Is Your Gaming Console Safe?: Embedded Devices, an AntiVirus-free Safe Hideout for Malware
Runtime Firmware Integrity Verification: What Can Now Be Achieved ANSSI