Home
/
tmp
/
blackHat
File
Size
Last Modified
..
-
2024-01-25 11:45:41
US-13-Akhawe-Clickjacking-Revisited-A-Perceptual-View-of-UI-Security-Slides.pdf
1.55MB
2013-07-31 07:49:55
us-13-Alexander-keynote.m4v
188.87MB
2013-08-01 15:31:33
us-13-Alexander-keynote.pdf
15.36MB
2013-07-31 12:35:44
US-13-Allodi-HOW-CVSS-is-DOSsing-Your-Patching-Policy-Slides.pdf
6.98MB
2013-07-31 07:50:47
US-13-Allodi-HOW-CVSS-is-DOSsing-Your-Patching-Policy-WP.pdf
322.73KB
2013-07-31 07:50:50
US-13-Apa-Compromising-Industrial-Facilities-From-40-Miles-Away-Slides.pdf
4.41MB
2013-07-31 07:51:24
US-13-Apa-Compromising-Industrial-Facilities-From-40-Miles-Away-WP.pdf
5.99MB
2013-07-31 07:52:07
US-13-Aumasson-Password-Hashing-the-Future-is-Now-Slides.pdf
3.94MB
2013-07-31 15:10:05
US-13-Aumasson-Password-Hashing-the-Future-is-Now-WP.pdf
69.49KB
2013-07-31 07:52:39
US-13-Barisani-Fully-Arbitrary-802-3-Packet-Injection-Slides.pdf
684.58KB
2013-07-31 07:52:44
US-13-Barisani-Fully-Arbitrary-802-3-Packet-Injection-WP.pdf
43.49KB
2013-07-31 07:52:45
US-13-Bathurst-Methodologies-for-Hacking-Embdded-Security-Appliances-Slides.pdf
2.45MB
2013-07-31 07:53:03
us-13-Blanchou-Shattering-Illusions-in-Lock-Free-Worlds.pdf
1.12MB
2013-08-01 15:53:09
US-13-Bremer-Mo-Malware-Mo-Problems-Cuckoo-Sandbox-Slides.pdf
1.73MB
2013-07-31 07:53:17
US-13-Bremer-Mo-Malware-Mo-Problems-Cuckoo-Sandbox-WP.pdf
511.22KB
2013-07-31 07:53:22
US-13-Brodie-A-Practical-Attack-against-MDM-Solutions-Slides.pdf
2.07MB
2013-07-31 07:53:36
US-13-Brodie-A-Practical-Attack-against-MDM-Solutions-WP.pdf
0.96MB
2013-07-31 07:53:44
US-13-Brown-RFID-Hacking-Live-Free-or-RFID-Hard-Code.zip
4.31MB
2013-08-14 18:06:19
US-13-Brown-RFID-Hacking-Live-Free-or-RFID-Hard-Slides.pdf
9.16MB
2013-08-14 18:06:50
US-13-Brunschwiler-Energy-Fraud-and-Orchestrated-Blackouts-Issues-with-Wireless-Metering-Protocols-Slides.pdf
12.96MB
2013-08-12 11:55:01
US-13-Brunschwiler-Energy-Fraud-and-Orchestrated-Blackouts-Issues-with-Wireless-Metering-Protocols-WP.pdf
4.63MB
2013-07-31 07:55:54
US-13-Butterworth-BIOS-Security-Code.zip
2.56MB
2013-08-14 17:49:29
US-13-Butterworth-BIOS-Security-Slides.pdf
5.21MB
2013-08-14 17:49:13
US-13-Butterworth-BIOS-Security-WP.pdf
186.16KB
2013-07-31 07:56:11
US-13-Cesare-Bugalyze.com-Detecting-Bugs-Using-Decompilation-Slides.pdf
2.37MB
2013-07-31 07:56:29
US-13-Cesare-Bugalyze.com-Detecting-Bugs-Using-Decompilation-WP.pdf
718.26KB
2013-07-31 07:56:34
US-13-Chan-Smashing-The-Font-Scaler-Engine-in-Windows-Kernel-Slides.pdf
8.14MB
2013-07-31 07:57:34
US-13-Chan-Smashing-The-Font-Scaler-Engine-in-Windows-Kernel-WP.pdf
1.15MB
2013-07-31 07:57:43
US-13-Chastuhin-With-BIGDATA-comes-BIG-responsibility-Slides.pdf
4.95MB
2013-07-31 07:58:18
US-13-Chastuhin-With-BIGDATA-comes-BIG-responsibility-WP.pdf
949.75KB
2013-07-31 07:58:25
US-13-Clark-Legal-Aspects-of-Full-Spectrum-Computer-Network-Active-Defense-Slides.pdf
1.60MB
2013-07-31 07:58:39
US-13-Cole-OPSEC-Failures-of-Spies-Slides.pdf
1.32MB
2013-07-31 07:58:48
US-13-Crowley-Home-Invasion-2-0-Slides.pdf
1.13MB
2013-07-31 07:58:58
US-13-Crowley-Home-Invasion-2-0-WP.pdf
279.97KB
2013-07-31 07:59:00
US-13-Crowley-HomeInvasion2-0-Source-Code.zip
1.08MB
2013-07-31 07:59:08
US-13-Daigniere-TLS-Secrets-Slides.pdf
577.93KB
2013-07-31 07:59:13
US-13-Daigniere-TLS-Secrets-WP.pdf
349.54KB
2013-07-31 07:59:16
US-13-Davis-Deriving-Intelligence-From-USB-Stack-Interactions-Slides.pdf
1.58MB
2013-07-31 07:59:28
US-13-Duckwall-Pass-The-Hash-2-The-Admins-Revenge-Code.zip
7.63KB
2013-07-31 07:59:29
US-13-Duckwall-Pass-the-Hash-Slides.pdf
828.85KB
2013-07-31 07:59:36
US-13-Duckwall-Pass-the-Hash-WP.pdf
787.80KB
2013-07-31 07:59:42
US-13-Dudley-Beyond-the-Application-Cellular-Privacy-Regulatory-Space-Slides.pdf
2.17MB
2013-08-01 11:18:17
US-13-Dudley-Beyond-the-Application-Cellular-Privacy-Regulatory-Space-WP.pdf
352.17KB
2013-07-31 08:00:22
US-13-Esparza-PDF-Attack-A-journey-from-the-Exploit-Kit-Slides-Source.zip
157.91KB
2013-07-31 08:00:24
US-13-Esparza-PDF-Attack-A-journey-from-the-Exploit-Kit-Slides.pdf
1.23MB
2013-08-20 16:53:21
US-13-Espinhara-Using-Online-Activity-As-Digital-Fingerprints-Slides.pdf
2.01MB
2013-07-31 08:00:44
US-13-Espinhara-Using-Online-Activity-As-Digital-Fingerprints-WP.pdf
1.27MB
2013-07-31 08:00:53
US-13-Fiterman-Is-that-a-Government-in-Your-Network-Slides.pdf
6.87MB
2013-07-31 08:01:42
US-13-Forner-Out-of-Control-Demonstrating-SCADA-Slides.pdf
2.09MB
2013-07-31 08:01:56
US-13-Forner-Out-of-Control-Demonstrating-SCADA-WP.pdf
825.96KB
2013-07-31 08:02:03
US-13-Forristal-Android-One-Root-to-Own-Them-All-Slides.pdf
3.97MB
2013-07-31 08:02:32
US-13-Geffner-End-To-End-Analysis-of-a-Domain-Generating-Algorithm-Malware-Family-Slides.pdf
6.57MB
2013-07-31 08:03:20
US-13-Geffner-End-To-End-Analysis-of-a-Domain-Generating-Algorithm-Malware-Family-WP.pdf
2.59MB
2013-07-31 08:03:39
US-13-Geffner-Tor...-All-The-Things-Slides.pdf
4.66MB
2013-07-31 08:04:14
US-13-Geffner-Tor...-All-The-Things-WP.pdf
838.84KB
2013-07-31 08:04:21
US-13-Gorenc-Java-Every-Days-Exploiting-Software-Running-on-3-Billion-Devices-Slides.pdf
2.78MB
2013-07-31 08:04:41
US-13-Gorenc-Java-Every-Days-Exploiting-Software-Running-on-3-Billion-Devices-WP.pdf
3.02MB
2013-07-31 08:05:05
US-13-Grand-JTAGulator-Assisted-Discovery-of-On-Chip-Debug-Interfaces-Code.zip
1.10MB
2013-07-31 08:05:13
US-13-Grand-JTAGulator-Assisted-Discovery-of-On-Chip-Debug-Interfaces-Slides.pdf
9.82MB
2013-07-31 08:06:26
US-13-Gupta-LTE-Booms-withVulnerabilities-WP.pdf
156.15KB
2013-07-31 08:06:28
US-13-Hanif-Binarypig-Scalable-Malware-Analytics-in-Hadoop-Code.tar.gz
1.19MB
2013-07-31 08:06:36
US-13-Hanif-Binarypig-Scalable-Malware-Analytics-in-Hadoop-Slides.pdf
6.05MB
2013-08-19 11:33:21
US-13-Hanif-Binarypig-Scalable-Malware-Analytics-in-Hadoop-WP.pdf
170.72KB
2013-07-31 08:07:15
US-13-Haruyama-Malicous-File-For-Exploiting-Forensic-Software-Slides.pdf
1.41MB
2013-07-31 08:07:27
US-13-Healey-Above-My-Pay-Grade-Slides.pdf
2.19MB
2013-07-31 08:07:43
US-13-Healey-Above-My-Pay-Grade-WP.pdf
584.34KB
2013-07-31 08:07:47
US-13-Heffner-Exploiting-Network-Surveillance-Cameras-Like-A-Hollywood-Hacker-Slides.pdf
22.00MB
2013-07-31 08:10:21
US-13-Heffner-Exploiting-Network-Surveillance-Cameras-Like-A-Hollywood-Hacker-WP.pdf
3.93MB
2013-07-31 08:10:51
US-13-Kennedy-CMX-IEEE-Clean-File-Metadata-Exchange-WP.pdf
633.69KB
2013-07-31 08:10:56
US-13-Kohlenberg-UART-Thou-Mad-Slides.pdf
478.61KB
2013-07-31 08:11:00
US-13-Kohlenberg-UART-Thou-Mad-WP.pdf
644.67KB
2013-07-31 08:11:05
US-13-Lau-Mactans-Injecting-Malware-into-iOS-Devices-via-Malicious-Chargers-Slides.pdf
3.37MB
2013-08-14 17:42:28
US-13-Lau-Mactans-Injecting-Malware-into-iOS-Devices-via-Malicious-Chargers-WP.pdf
2.19MB
2013-08-14 17:42:45
US-13-Lee-Hacking-Surveilling-and-Deceiving-Victims-on-Smart-TV-Slides.pdf
1.30MB
2013-07-31 08:11:57
US-13-Lee-Universal-DDoS-Mitigation-Bypass-Code.zip
40.33KB
2013-08-14 17:44:05
US-13-Lee-Universal-DDoS-Mitigation-Bypass-Slides.pdf
4.17MB
2013-08-14 17:44:21
US-13-Lee-Universal-DDoS-Mitigation-Bypass-WP.pdf
452.73KB
2013-08-14 17:44:04
US-13-Li-How-to-Grow-a-TREE-Code.zip
3.78MB
2013-07-31 08:12:41
US-13-Martin-Buying-Into-The-Bias-Why-Vulnerability-Statistics-Suck-Slides.pdf
7.85MB
2013-08-12 15:56:15
US-13-Martin-Buying-Into-The-Bias-Why-Vulnerability-Statistics-Suck-WP.pdf
343.11KB
2013-07-31 08:28:39
US-13-Masse-Denial-of-Service-as-a-Service-Slides.pdf
5.36MB
2013-08-12 15:50:14
US-13-McNamee-How-To-Build-a-SpyPhone-Slides.pdf
3.15MB
2013-07-31 08:29:40
US-13-McNamee-How-To-Build-a-SpyPhone-WP.pdf
842.56KB
2013-07-31 08:29:48
US-13-Nakibly-Owning-the-Routing-Table-Part-II-Slides.pdf
546.84KB
2013-07-31 08:29:53
US-13-Nakibly-Owning-the-Routing-Table-Part-II-WP.pdf
161.62KB
2013-07-31 08:29:55
US-13-Nixon-Denying-Service-to-DDOS-Protection-Services-Slides.pdf
3.25MB
2013-08-12 12:08:08
US-13-Nixon-Denying-Service-to-DDOS-Protection-Services-WP.pdf
241.01KB
2013-07-31 08:30:15
US-13-OConnor-CreepyDOL-Cheap-Distributed-Stalking-Slides.pdf
2.22MB
2013-08-12 12:13:12
US-13-OConnor-CreepyDOL-Cheap-Distributed-Stalking-WP.pdf
78.96KB
2013-07-31 08:30:33
US-13-OFlynn-Power-Analysis-Attacks-for-Cheapskates-Slides.pdf
13.55MB
2013-07-31 08:32:23
US-13-OFlynn-Power-Analysis-Attacks-for-Cheapskates-WP.pdf
2.19MB
2013-07-31 08:32:41
US-13-Opi-Evading-Deep-Inspection-for-Fun-and-Shell-Code.zip
2.84MB
2013-07-31 08:33:06
US-13-Opi-Evading-Deep-Inspection-for-Fun-and-Shell-Slides.pdf
2.54MB
2013-07-31 08:33:28
US-13-Opi-Evading-Deep-Inspection-for-Fun-and-Shell-WP.pdf
231.61KB
2013-07-31 08:33:30
US-13-Ossmann-Multiplexed-Wired-Attack-Surfaces-WP.pdf
24.86KB
2013-07-31 08:33:31
US-13-Patnaik-Javascript-Static-Security-Analysis-made-easy-with-JSPrime-Slides.pdf
1.07MB
2013-07-31 08:33:40
US-13-Patnaik-Javascript-Static-Security-Analysis-made-Easy-with-JSPrime-WP.pdf
141.25KB
2013-07-31 08:33:42
US-13-Peck-Abusing-Web-APIs-Through-Scripted-Android-Applications-Slides.pdf
682.97KB
2013-07-31 08:33:48
US-13-Peck-Abusing-Web-APIs-Through-Scripted-Android-Applications-WP.pdf
87.79KB
2013-07-31 08:33:49
US-13-Pinto-Defending-Networks-with-Incomplete-Information-A-Machine-Learning-Approach-Slides.pdf
3.79MB
2013-08-14 17:39:37
US-13-Pinto-Defending-Networks-with-Incomplete-Information-A-Machine-Learning-Approach-WP.pdf
740.59KB
2013-08-14 17:39:23
US-13-Polyakov-Practical-Pentesting-of-ERPs-and-Business-Applications-Slides.pdf
4.61MB
2013-07-31 08:34:51
US-13-Polyakov-Practical-Pentesting-of-ERPs-and-Business-Applications-WP.pdf
1.65MB
2013-07-31 08:35:05
US-13-Prado-SSL-Gone-in-30-seconds-A-BREACH-beyond-CRIME-Slides.pdf
2.04MB
2013-07-31 08:35:21
US-13-Prado-SSL-Gone-in-30-seconds-A-BREACH-beyond-CRIME-WP.pdf
1.04MB
2013-07-31 08:35:30
US-13-Quynh-OptiROP-Hunting-for-ROP-Gadgets-in-Style-WP.pdf
268.39KB
2013-07-31 08:35:32
US-13-Raber-Virtual-Deobfuscator-A-DARPA-Cyber-Fast-Track-Funded-Effort-Code.zip
160.68KB
2013-07-31 08:35:34
US-13-Raber-Virtual-Deobfuscator-A-DARPA-Cyber-Fast-Track-Funded-Effort-Slides.pdf
890.74KB
2013-07-31 08:35:42
US-13-Raber-Virtual-Deobfuscator-A-DARPA-Cyber-Fast-Track-Funded-Effort-WP.pdf
419.02KB
2013-07-31 08:35:45
US-13-Reidy-Combating-the-Insider-Threat-At-The-FBI-Slides.pdf
2.94MB
2013-07-31 08:36:09
US-13-Salgado-SQLi-Optimization-and-Obfuscation-Techniques-Slides.pdf
1.14MB
2013-08-12 15:47:54
US-13-Salgado-SQLi-Optimization-and-Obfuscation-Techniques-WP.pdf
224.05KB
2013-07-31 08:36:26
US-13-Saxe-CrowdSource-An-Open-Source-Crowd-Trained-Machine-Learning-Model-Slides.pdf
2.59MB
2013-07-31 08:36:46
US-13-Sevinsky-Funderbolt-Adventures-in-Thunderbolt-DMA-Attacks-Slides.pdf
10.64MB
2013-08-14 17:37:13
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides.pdf
1.29MB
2013-08-12 12:10:59
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-based-Sandboxes-WP.pdf
1.17MB
2013-07-31 08:37:56
US-13-Smyth-Truncating-TLS-Connections-to-Violate-Beliefs-in-Web-Applications-Slides.pdf
1.26MB
2013-08-01 15:54:43
US-13-Smyth-Truncating-TLS-Connections-to-Violate-Beliefs-in-Web-Applications-WP.pdf
133.31KB
2013-07-31 08:38:06
US-13-Snow-Just-In-Time-Code-Reuse-Slides.pdf
6.57MB
2013-08-14 17:50:50
US-13-Soeder-Black-Box-Assessment-of-Pseudorandom-Algorithms-Code.zip
67.84KB
2013-07-31 08:38:50
US-13-Soeder-Black-Box-Assessment-of-Pseudorandom-Algorithms-Slides.pdf
1.12MB
2013-07-31 08:39:00
US-13-Soeder-Black-Box-Assessment-of-Pseudorandom-Algorithms-WP.pdf
318.52KB
2013-07-31 08:39:02
US-13-Spill-Whats-on-the-Wire-Slides.pdf
2.44MB
2013-07-31 08:39:22
US-13-Spill-Whats-on-the-Wire-WP.pdf
146.50KB
2013-07-31 08:39:24
us-13-Stamos-The-Factoring-Dead.pdf
1.14MB
2013-08-14 18:01:17
US-13-Stewart-Mobile-Malware-Why-the-Traditional-AV-Paradigm-is-Doomed-Slides.pdf
7.82MB
2013-07-31 08:40:27
US-13-Stewart-Mobile-Malware-Why-the-Traditional-AV-Paradigm-is-Doomed-WP.pdf
115.22KB
2013-07-31 08:40:29
US-13-Stone-Pixel-Perfect-Timing-Attacks-with-HTML5-WP.pdf
841.27KB
2013-07-31 08:40:36
US-13-Sumner-Predicting-Susceptibility-to-Social-Bots-on-Twitter-Slides.pdf
2.23MB
2013-07-31 08:40:55
US-13-Temmingh-Maltego-Tungsten-as-a-Collaborative-Attack-Platform-Slides.pdf
4.61MB
2013-07-31 08:41:34
US-13-Temmingh-Maltego-Tungsten-as-a-Collaborative-Attack-Platform-WP.pdf
532.94KB
2013-07-31 08:41:38
US-13-Vuksan-Press-ROOT-to-Continue-Detecting-MacOS-and-Windows-Bootkits-with-RDFU-Slides.pdf
1.41MB
2013-07-31 08:41:50
US-13-Vuksan-Press-ROOT-to-Continue-Detecting-MacOS-and-Windows-Bootkits-with-RDFU-WP.pdf
174.65KB
2013-07-31 08:41:52
US-13-Wicherski-Hacking-like-in-the-Movies-Visualizing-Page-Tables-Pictures.zip
619.59KB
2013-07-31 08:41:57
US-13-Wicherski-Hacking-like-in-the-Movies-Visualizing-Page-Tables-Slides.pdf
1.16MB
2013-07-31 08:42:09
US-13-Wicherski-Hacking-like-in-the-Movies-Visualizing-Page-Tables-WP.pdf
945.36KB
2013-07-31 08:42:18
US-13-Wilhoit-The-SCADA-That-Didnt-Cry-Wolf-Whos-Really-Attacking-Your-ICS-Devices-Slides.pdf
2.85MB
2013-08-12 15:46:44
US-13-Williams-Post-Exploitation-Operations-with-Cloud-Synchronization-Services-Slides.pdf
1.87MB
2013-07-31 08:43:02
US-13-Williams-Post-Exploitation-Operations-with-Cloud-Synchronization-Services-WP.pdf
1.54MB
2013-07-31 08:43:15
US-13-Wroblewski-The-Web-IS-Vulnerable-XSS-Defense-on-the-Battle-Front-Slides.pdf
12.01MB
2013-07-31 08:45:03
US-13-Wroblewski-The-Web-IS-Vulnerable-XSS-Defense-on-the-BattleFront-Code.zip
2.82MB
2013-07-31 08:45:28
US-13-Xu-New-Trends-in-FastFlux-Networks-Slides.pdf
1.82MB
2013-07-31 08:45:44
US-13-Xu-New-Trends-in-FastFlux-Networks-WP.pdf
368.05KB
2013-07-31 08:45:47
US-13-Yarochkin-In-Depth-Analysis-of-Escalated-APT-Attacks-Slides.pdf
11.98MB
2013-08-29 14:40:15
US-13-Yarochkin-In-Depth-Analysis-of-Escalated-APT-Attacks-WP.pdf
3.49MB
2013-07-31 08:46:53
US-13-Young-Mainframes-The-Past-Will-Come-Back-to-Haunt-You-Slides.pdf
8.14MB
2013-07-31 08:48:03
US-13-Young-Mainframes-The-Past-Will-Come-Back-to-Haunt-You-WP.pdf
1.13MB
2013-07-31 08:48:13
US-13-Zaddach-Workshop-on-Embedded-Devices-Security-and-Firmware-Reverse-Engineering-Slides.pdf
3.15MB
2013-07-31 08:48:40
US-13-Zaddach-Workshop-on-Embedded-Devices-Security-and-Firmware-Reverse-Engineering-WP.pdf
873.92KB
2013-07-31 08:48:48
×
{{modal_header}}
MD5
{{md5_sum}}
SHA1
{{sha1_sum}}