Blackhat

Results: 880



#Item
101

Beyond EIP spoonm & skape BlackHat, 2005 Part I

Add to Reading List

Source URL: hick.org

- Date: 2007-10-23 01:59:08
    102

    GOODWARE DRUGS FOR MALWARE: ON-THE-FLY MALWARE ANALYSIS AND CONTAINMENT DAMIANO BOLZONI CHRISTIAAN SCHADE TWENTE SECURITY LAB

    Add to Reading List

    Source URL: media.blackhat.com

    - Date: 2012-04-07 14:52:47
      103

      SSL Interception Proxies and Transitive Trust Jeff Jarmoc Sr. Security Researcher Dell SecureWorks

      Add to Reading List

      Source URL: media.blackhat.com

      - Date: 2012-04-07 15:31:48
        104

        Signing into One Billion Mobile App Accounts Effortlessly with OAuth2.0 Ronghai Yang Wing Cheong Lau Tianyu Liu The Chinese University of Hong Kong

        Add to Reading List

        Source URL: www.blackhat.com

        - Date: 2016-11-30 13:13:22
          105

          PRACTICAL MALWARE ANALYSIS Kris Kendall WHY PERFORM MALWARE ANALYSIS? What are some of the reasons that one might want to invest the (sometimes significant)

          Add to Reading List

          Source URL: www.blackhat.com

          - Date: 2015-05-28 15:51:25
            106

            Microsoft Word - BHUSA09-McDonald-WindowsHeap-PAPER.doc

            Add to Reading List

            Source URL: www.blackhat.com

            - Date: 2015-05-28 15:51:50
              107

              ARMageddon How Your Smartphone CPU Breaks Software-Level Security And Privacy Moritz Lipp and Cl´ementine Maurice November 3, 2016—Black Hat Europe

              Add to Reading List

              Source URL: www.blackhat.com

              - Date: 2016-11-04 12:44:44
                108

                OAuth User Profile Attack How to Sign into One Billion Mobile App Accounts Effortlessly Ronghai Yang, Prof. Wing Cheong Lau and Tianyu Liu The Chinese University of Hong Kong Nov 4, 2016

                Add to Reading List

                Source URL: www.blackhat.com

                - Date: 2016-11-30 13:13:22
                  109

                  DIVING INTO IE 10’S ENHANCED PROTECTED MODE SANDBOX Mark Vincent Yason IBM X-Force Advanced Research yasonm[at]ph[dot]ibm[dot]com @MarkYason (v3)

                  Add to Reading List

                  Source URL: www.blackhat.com

                  - Date: 2015-05-28 15:50:46
                    UPDATE