Welcome To Rootkit Country
|
|
iPhone and iPad Hacking
|
Ilja van Sprundel
,
IOActive, Inc.
|
Dymanic Cryptographic Trapdoors
|
Eric Filiol
|
Network Application Firewalls vs. Contemporary Threats
|
Brad Woodberg
|
GRAPE: Generative Rule-based Generic Stateful Fuzzing
|
|
Security Defect Metrics for Targeted Fuzzing
|
Matt Miller
,
David Weston
,
Microsoft Corporation
|
A Castle Made of Sand: Adobe Reader X Sandbox
|
Richard Johnson
|
SMS-o-Death: From Analyzing To Attacking Mobile Phones on a Large Scale
|
Collin Mulliner
,
Nico Golde
|
Borken Fonts: The Story of Naive Parsers and Attacker Controlled Reboots
|
Red Hat
|
Understanding and Exploiting Flash ActionScript Vulnerabilities
|
Haifei Li
,
Fortinet, Inc.
|
Showing How Security Has (And Hasn't) Improved, After Ten Years Of Trying
|
|
The Law of Web Application Hacking
|
Marcia Hofmann
,
EFF
|
Black Box Auditing Adobe Shockwave
|
|
Stale Pointers Are The New Black
|
Vincenzo Iozzo
|
Deconstructing ColdFusion
|
Veracode
|
Chip & PIN is Definitely Broken
|
Andrea Barisani
,
Daniele Bianco
|
Project Ubertooth: Building a Better Bluetooth Adapter
|
Michael Ossmann
,
Great Scott Gadgets
|
Is Your Gaming Console Safe?: Embedded Devices, an AntiVirus-free Safe Hideout for Malware
|
|
Runtime Firmware Integrity Verification: What Can Now Be Achieved
|
ANSSI
|