Blackhat

Results: 880



#Item
111

Embedded Devices Security and Firmware Reverse Engineering BH13US Workshop Jonas Zaddach

Add to Reading List

Source URL: media.blackhat.com

- Date: 2013-07-31 04:48:48
    112

    Understanding the Low Fragmentation Heap Chris Valasek, Researcher, X-Force Advanced R&D / @nudehaberdasher Blackhat USA 2010

    Add to Reading List

    Source URL: illmatics.com

    - Date: 2010-08-11 08:35:33
      113

      Microsoft PowerPoint - acquisti-face-BH-Webinar-2012-out.pptx

      Add to Reading List

      Source URL: blackhat.com

      - Date: 2015-05-28 15:51:07
        114

        DIVING INTO IE 10’S ENHANCED PROTECTED MODE SANDBOX Mark Vincent Yason IBM X-Force Advanced Research yasonm[at]ph[dot]ibm[dot]com @MarkYason (v3)

        Add to Reading List

        Source URL: www.blackhat.com

        - Date: 2015-05-28 15:50:46
          115

          Problem: Preventative Security Attackers are agile, adaptive, and results focused – effective techniques often don’t map to security boundaries

          Add to Reading List

          Source URL: www.blackhat.com

          - Date: 2016-08-29 12:50:12
            116

            NONCE-DISRESPECTING ADVERSARIES PRACTICAL FORGERY ATTACKS ON GCM IN TLS Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic

            Add to Reading List

            Source URL: www.blackhat.com

            - Date: 2016-08-29 12:50:07
              117

              Endrun—Secure Digital Communications For Our Modern Dystopia∗ Grant Dobbe† and Brendan O’Connor‡ October 16, 2014 The Internet is no longer trustworthy, having been compromised by bad actors

              Add to Reading List

              Source URL: www.blackhat.com

              - Date: 2015-05-28 15:50:55
                118

                Behind the Scenes with iOS Security Black Hat 2016 Ivan Krstić Head of Security Engineering and Architecture, Apple

                Add to Reading List

                Source URL: www.blackhat.com

                - Date: 2016-08-08 16:57:06
                  119

                  風水 Heap Feng Shui in JavaScript Alexander Sotirov Black Hat Europe 2007

                  Add to Reading List

                  Source URL: www.blackhat.com

                  - Date: 2015-05-28 15:51:30
                    120

                    Introduction Where it all goes wrong... Here comes the Tool Conclusion TLS “secrets“

                    Add to Reading List

                    Source URL: media.blackhat.com

                    - Date: 2013-07-31 03:59:13
                      UPDATE