Jump to content
Nytro

Ruxcon slides

Recommended Posts

Posted

Ruxcon slides

[TABLE=class: roundTable]

[TR]

[TH]Presentation[/TH]

[TH]Speaker[/TH]

[TH][/TH]

[TH]Slides[/TH]

[TH][/TH]

[/TR]

[TR]

[TD] Amateur Satellite Intelligence: Watching North Korea[/TD]

[TD] Dave Jorm[/TD]

[TD] saty.jpg[/TD]

[TD] Slides[/TD]

[/TR]

[TR]

[TD] Payment Applications Handle Lots of Money. No, Really: Lots Of It.[/TD]

[TD] Mark Swift & Alberto Revelli[/TD]

[TD] markswift.png[/TD]

[TD] Slides[/TD]

[/TR]

[TR]

[TD] 50 Shades of Oddness - Inverting the Anti-Malware Paradigm[/TD]

[TD] Peter Szabo[/TD]

[TD] petesabzo.jpg[/TD]

[TD] Not available[/TD]

[/TR]

[TR]

[TD] Visualization For Reverse Engineering and Forensics[/TD]

[TD] Danny Quist[/TD]

[TD] dan.png[/TD]

[TD] Slides[/TD]

[/TR]

[TR]

[TD] Electronic Voting Security, Privacy and Verifiability[/TD]

[TD] Vanessa Teague[/TD]

[TD]

[/TD]

[TD] Slides[/TD]

[/TR]

[TR]

[TD] Cracking and Analyzing Apple iCloud Protocols: iCloud Backups, Find My iPhone, Document Storage[/TD]

[TD] Vladimir Katalov[/TD]

[TD] vlad.jpg[/TD]

[TD] Slides[/TD]

[/TR]

[TR]

[TD] Buried by time, dust and BeEF[/TD]

[TD] Michele Orru[/TD]

[TD] micheleorru.png[/TD]

[TD] Slides[/TD]

[/TR]

[TR]

[TD] Under the Hood Of Your Password Generator[/TD]

[TD] Michael Samuel[/TD]

[TD] mikesamuel.jpg[/TD]

[TD] Slides[/TD]

[/TR]

[TR]

[TD] Malware, Sandboxing and You: How Enterprise Malware and 0day Detection is About To Fail (Again)[/TD]

[TD] Jonathan Brossard[/TD]

[TD] JonathanBrossard150x190.png[/TD]

[TD] Slides[/TD]

[/TR]

[TR]

[TD] Espionage: Everything Old Is New Again[/TD]

[TD] Kayne Naughton[/TD]

[TD] kayne.jpg[/TD]

[TD] Not available[/TD]

[/TR]

[TR]

[TD] VoIP Wars: Return of the SIP[/TD]

[TD] Fatih Ozavci[/TD]

[TD] fatih.png[/TD]

[TD] Slides[/TD]

[/TR]

[TR]

[TD] BIOS Chronomancy: Fixing the Static Root of Trust for Measurement[/TD]

[TD] John Butterworth[/TD]

[TD] johnb-g.png[/TD]

[TD] Slides[/TD]

[/TR]

[TR]

[TD] The BYOD PEAP Show: Mobile Devices Bare Auth[/TD]

[TD] Josh Yavor[/TD]

[TD] default1.png[/TD]

[TD] Slides[/TD]

[/TR]

[TR]

[TD] Bypassing Content-Security-Policy[/TD]

[TD] Alex "kuza55" Kouzemtchenko[/TD]

[TD] default3.png[/TD]

[TD] Slides[/TD]

[/TR]

[TR]

[TD] Deus Ex Concolica - Explorations in end-to-end automated binary exploitation[/TD]

[TD] Mark 'c01db33f' Brand[/TD]

[TD] markbrand.png[/TD]

[TD] Slides[/TD]

[/TR]

[TR]

[TD] Mining Mach Services within OS X Sandbox[/TD]

[TD] Meder Kydyraliev [/TD]

[TD] default4.jpg[/TD]

[TD] Not available[/TD]

[/TR]

[TR]

[TD] Top of the Pops: How to top the charts with zero melodic talent and a few friendly computers[/TD]

[TD] Peter Fillmore[/TD]

[TD] default2.png[/TD]

[TD] Slides[/TD]

[/TR]

[TR]

[TD] A Beginner's Journey into the World of Hardware Hacking[/TD]

[TD] Silvio Cesare[/TD]

[TD] slvio.jpg[/TD]

[TD] Not available[/TD]

[/TR]

[TR]

[TD] Underground: The Julian Assange story (with Q&A)[/TD]

[TD] Suelette Dreyfus & Ken Day[/TD]

[TD] Ken-Day.jpg[/TD]

[TD] Not available[/TD]

[/TR]

[TR]

[TD] Wardriving in the cloud: A closer look at Apple and Google location services[/TD]

[TD] Hubert Seiwert[/TD]

[TD] HubertSeiwert.png[/TD]

[TD] Not available[/TD]

[/TR]

[TR]

[TD] AntiTraintDroid - Escaping Taint Analysis on Android for Fun and Profit[/TD]

[TD] Golam 'Babil' Sarwar[/TD]

[TD] babil.png[/TD]

[TD] Slides[/TD]

[/TR]

[TR]

[TD] The Art Of Facts - A look at Windows Host Based Forensic Investigation[/TD]

[TD] Adam Daniel[/TD]

[TD] adam.jpg[/TD]

[TD] Not available[/TD]

[/TR]

[TR]

[TD] Introspy : Security Profiling for Blackbox iOS and Android[/TD]

[TD] Alban Diquet & Marc Blanchou[/TD]

[TD] ad.jpg[/TD]

[TD] Slides[/TD]

[/TR]

[TR]

[TD] Inside Story Of Internet Banking: Reversing The Secrets Of Banking Malware[/TD]

[TD] Sean Park[/TD]

[TD] Sean-Park.jpg[/TD]

[TD] Slides[/TD]

[/TR]

[TR]

[TD] Edward Snowden: It's Complicated[/TD]

[TD] Patrick Gray[/TD]

[TD] pgray.jpg[/TD]

[TD] Slides[/TD]

[/TR]

[TR]

[TD] Schoolin' In: How to Build Better Hackers[/TD]

[TD] Brendan Hop[/TD]

[TD] br.png[/TD]

[TD] Not available[/TD]

[/TR]

[TR]

[TD] Roll the Dice and Take Your Chances[/TD]

[TD] Thiébaud Weksteen[/TD]

[TD] 4.JPG[/TD]

[TD] Slides[/TD]

[/TR]

[TR]

[TD] Cracking, CUDA and the Cloud – Cracking Passwords Has Never Been So Simple, Fast and Cheap[/TD]

[TD] John Bird[/TD]

[TD] johnb.png[/TD]

[TD] Slides[/TD]

[/TR]

[/TABLE]

Sursa: Slides

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...