Nytro Posted November 5, 2013 Report Posted November 5, 2013 Ruxcon slides[TABLE=class: roundTable][TR][TH]Presentation[/TH][TH]Speaker[/TH][TH][/TH][TH]Slides[/TH][TH][/TH][/TR][TR][TD] Amateur Satellite Intelligence: Watching North Korea[/TD][TD] Dave Jorm[/TD][TD] [/TD][TD] Slides[/TD][/TR][TR][TD] Payment Applications Handle Lots of Money. No, Really: Lots Of It.[/TD][TD] Mark Swift & Alberto Revelli[/TD][TD] [/TD][TD] Slides[/TD][/TR][TR][TD] 50 Shades of Oddness - Inverting the Anti-Malware Paradigm[/TD][TD] Peter Szabo[/TD][TD] [/TD][TD] Not available[/TD][/TR][TR][TD] Visualization For Reverse Engineering and Forensics[/TD][TD] Danny Quist[/TD][TD] [/TD][TD] Slides[/TD][/TR][TR][TD] Electronic Voting Security, Privacy and Verifiability[/TD][TD] Vanessa Teague[/TD][TD] [/TD][TD] Slides[/TD][/TR][TR][TD] Cracking and Analyzing Apple iCloud Protocols: iCloud Backups, Find My iPhone, Document Storage[/TD][TD] Vladimir Katalov[/TD][TD] [/TD][TD] Slides[/TD][/TR][TR][TD] Buried by time, dust and BeEF[/TD][TD] Michele Orru[/TD][TD] [/TD][TD] Slides[/TD][/TR][TR][TD] Under the Hood Of Your Password Generator[/TD][TD] Michael Samuel[/TD][TD] [/TD][TD] Slides[/TD][/TR][TR][TD] Malware, Sandboxing and You: How Enterprise Malware and 0day Detection is About To Fail (Again)[/TD][TD] Jonathan Brossard[/TD][TD] [/TD][TD] Slides[/TD][/TR][TR][TD] Espionage: Everything Old Is New Again[/TD][TD] Kayne Naughton[/TD][TD] [/TD][TD] Not available[/TD][/TR][TR][TD] VoIP Wars: Return of the SIP[/TD][TD] Fatih Ozavci[/TD][TD] [/TD][TD] Slides[/TD][/TR][TR][TD] BIOS Chronomancy: Fixing the Static Root of Trust for Measurement[/TD][TD] John Butterworth[/TD][TD] [/TD][TD] Slides[/TD][/TR][TR][TD] The BYOD PEAP Show: Mobile Devices Bare Auth[/TD][TD] Josh Yavor[/TD][TD] [/TD][TD] Slides[/TD][/TR][TR][TD] Bypassing Content-Security-Policy[/TD][TD] Alex "kuza55" Kouzemtchenko[/TD][TD] [/TD][TD] Slides[/TD][/TR][TR][TD] Deus Ex Concolica - Explorations in end-to-end automated binary exploitation[/TD][TD] Mark 'c01db33f' Brand[/TD][TD] [/TD][TD] Slides[/TD][/TR][TR][TD] Mining Mach Services within OS X Sandbox[/TD][TD] Meder Kydyraliev [/TD][TD] [/TD][TD] Not available[/TD][/TR][TR][TD] Top of the Pops: How to top the charts with zero melodic talent and a few friendly computers[/TD][TD] Peter Fillmore[/TD][TD] [/TD][TD] Slides[/TD][/TR][TR][TD] A Beginner's Journey into the World of Hardware Hacking[/TD][TD] Silvio Cesare[/TD][TD] [/TD][TD] Not available[/TD][/TR][TR][TD] Underground: The Julian Assange story (with Q&A)[/TD][TD] Suelette Dreyfus & Ken Day[/TD][TD] [/TD][TD] Not available[/TD][/TR][TR][TD] Wardriving in the cloud: A closer look at Apple and Google location services[/TD][TD] Hubert Seiwert[/TD][TD] [/TD][TD] Not available[/TD][/TR][TR][TD] AntiTraintDroid - Escaping Taint Analysis on Android for Fun and Profit[/TD][TD] Golam 'Babil' Sarwar[/TD][TD] [/TD][TD] Slides[/TD][/TR][TR][TD] The Art Of Facts - A look at Windows Host Based Forensic Investigation[/TD][TD] Adam Daniel[/TD][TD] [/TD][TD] Not available[/TD][/TR][TR][TD] Introspy : Security Profiling for Blackbox iOS and Android[/TD][TD] Alban Diquet & Marc Blanchou[/TD][TD] [/TD][TD] Slides[/TD][/TR][TR][TD] Inside Story Of Internet Banking: Reversing The Secrets Of Banking Malware[/TD][TD] Sean Park[/TD][TD] [/TD][TD] Slides[/TD][/TR][TR][TD] Edward Snowden: It's Complicated[/TD][TD] Patrick Gray[/TD][TD] [/TD][TD] Slides[/TD][/TR][TR][TD] Schoolin' In: How to Build Better Hackers[/TD][TD] Brendan Hop[/TD][TD] [/TD][TD] Not available[/TD][/TR][TR][TD] Roll the Dice and Take Your Chances[/TD][TD] Thiébaud Weksteen[/TD][TD] [/TD][TD] Slides[/TD][/TR][TR][TD] Cracking, CUDA and the Cloud – Cracking Passwords Has Never Been So Simple, Fast and Cheap[/TD][TD] John Bird[/TD][TD] [/TD][TD] Slides[/TD][/TR][/TABLE]Sursa: Slides Quote