Blackhat

Results: 880



#Item
131C / Mach / Monolithic kernels / OS X / Struct / Loadable kernel module / Procfs / Typedef / Stat / X86-64 / Pointer / Operating system

2010 Netherlands Forensic Institute, Matthieu Suiche BlackHat Briefing, Washington DC (FebruaryTABLE OF CONTENTS

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2015-05-28 15:51:28
132Microcontrollers / ARM architecture / Linux-based devices / Single-board computers / Data transmission / Universal asynchronous receiver/transmitter / JTAG / Raspberry Pi / COM / C8051

UART Thou Mad? An Introduction to the UART Hardware Interface Mickey Shkatov Toby Kohlenberg 1

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-07-31 04:11:05
133

Automated Detection of Firefox ExtensionReuse • Click to edit Master text stylesVulnerabilities — Second level • Third level

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2016-04-11 12:54:56
    134

    Privacy, Economics, and Immediate Gratification: Why Protecting Privacy is Easy, But Selling It is Not Alessandro Acquisti Heinz School, Carnegie Mellon University

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2015-05-28 15:51:40
      135Computing / Software / Inter-process communication / System software / Object-oriented programming / Rich Text Format / Technical communication / Object Linking and Embedding / OLE / WordPad / Intel Security / Address space layout randomization

      ​Attacking Interoperability: ​An OLE Edition • • Haifei Li ()

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2015-08-17 13:19:15
      136

      1 Bringing Software Defined Radio to the Penetration Testing Community Jean-Michel Picod, Arnaud Lebrun, Jonathan-Christofer Demay Abstract—The large adoption of wireless devices goes further than WiFi networks: smart

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2015-05-28 15:51:03
        137

        A New CVEExploit Technology wang yu Black Hat - ASIA, 2016 Part One

        Add to Reading List

        Source URL: www.blackhat.com

        Language: English - Date: 2016-04-11 12:54:57
          138

          Android Spyware Disease and Medication Mustafa Hassan Saad, Department Of Computer Engineering MTC Cairo, Egypt

          Add to Reading List

          Source URL: www.blackhat.com

          Language: English - Date: 2016-03-30 22:52:18
            139

            A New CVEExploit Technology yu.wang@fireeye.com September 28, 2015 February 10, 2015, Patch Tuesday - Microsoft pushed many system-level patches including CVEMS15On the same day, Udi Yav

            Add to Reading List

            Source URL: www.blackhat.com

            Language: English - Date: 2016-04-11 12:54:57
              140

              C-SCAD: ASSESSING SECURITY FLAWS IN ClearSCADA WEB-X CLIENT! Diary of the Penetration Tester ! Aditya K Sood, Senior Security Researcher and Engineer SecNiche Security Labs (http://www.secniche.org )

              Add to Reading List

              Source URL: www.blackhat.com

              Language: English - Date: 2015-05-28 15:50:59
                UPDATE