Blackhat

Results: 880



#Item
151

KERNEL WARS: KERNEL-EXPLOITATION DEMYSTIFIED Introduction to kernel-mode vulnerabilities and exploitation

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:30
    152

    1 Enhancing Automated Malware Analysis Machines with Memory Analysis Tomer Teller, Adi Hayon Security Innovation Group

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2015-05-28 15:50:59
      153

      Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces (Extended Version) Andrei Costin

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2016-03-30 22:52:17
        154

        Reversing C++ As recent as a couple of years ago, reverse engineers can get by with just knowledge of C and assembly to reverse most applications. Now, due to the increasing use of C++ in malware as well as most moderns

        Add to Reading List

        Source URL: www.blackhat.com

        Language: English - Date: 2015-05-28 15:51:25
          155

          Attacking Distributed Systems The DNS Case Study Dan Kaminsky, CISSP Senior Security Consultant Copyright© 2003 Avaya Inc. All rights reserved

          Add to Reading List

          Source URL: www.blackhat.com

          Language: English - Date: 2015-05-28 15:51:29
            156

            DECONSTRUCTING KONY ANDROID APPLICATIONS KONY PAST, PRESENT, AND FUTURE Chris Weedon, June 1, 2015 Abstract

            Add to Reading List

            Source URL: www.blackhat.com

            Language: English - Date: 2015-06-18 12:54:48
              157

              Client-Side Protection Against DOM-based XSS Done Right (TM) Ben Stock, Sebastian Lekies, Martin Johns About us

              Add to Reading List

              Source URL: www.blackhat.com

              Language: English - Date: 2015-05-28 15:50:47
                158

                An Introduction to the CANard Toolkit Eric Evenchick March 9, 2015 Abstract The Controller Area Network (CAN) protocol is used for networking controllers in industrial and automotive applications. Interfacing with a

                Add to Reading List

                Source URL: www.blackhat.com

                Language: English - Date: 2015-05-28 15:50:47
                  159

                  WSUSpect Compromising the Windows Enterprise via Windows Update Paul Stone & Alex Chapman 5th August 2015

                  Add to Reading List

                  Source URL: www.blackhat.com

                  Language: English - Date: 2015-08-06 22:08:29
                    160

                    A 16 bit Rootkit and Second Generation Zigbee Chips at Black Hat USA 2009

                    Add to Reading List

                    Source URL: www.blackhat.com

                    Language: English - Date: 2015-05-28 15:51:49
                      UPDATE