Shopping Global Cybercrime Underground
|
Maxim Goncharov
|
Advanced Android Malware Detection Framework
|
Xu Hao
,
pLL
|
Poor Man's Panopticon - Mass CCTV Surveillance for the Masses
|
Andrei Costin
|
Exploiting Windows Kernel Vulnerabilities in Hard Conditions
|
Nikita Tarakanov
|
Techniques of Attacking Real SCADA & ICS Systems
|
SCADA StrangeLove
|
Hacking Sensors with EMI
|
Yongdae Kim
|
Defeating Windows Security Features via Underlying Hardware Way
|
MJ0011
|
Technical Trends in Recent Targeted Attacks
|
Gabor Pek
|
An Amazing Journey into the Depth of My Hard Drive
|
Jonas Zaddach
|
What Happen in Windows 7 Stays in Windows 7
|
Marion Marschalek
,
Moti Joseph
|
Automatic Exploit Generation for Application Source Code Analysis
|
Sergey Gordeychik
,
Alexey Moskvin
|