Blackhat

Results: 880



#Item
801Telecommunications engineering / Technology / IEEE 802.11 / Frequency-hopping spread spectrum / ANT / Spread spectrum / Wireless network / Multiplexing / OSI protocols / Radio resource management

Rob Havelt Black Hat Europe, 2009
 Greetings Black Hat Rob Havelt [removed]

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
802Malware / Software bugs / Shellcode / Antivirus software / Buffer overflow / Computer virus / Code injection / Portable Executable / Hooking / Cyberwarfare / Computer security / Failure

WiShMaster Windows Shellcode Mastery BlackHat Europe[removed]Benjamin CAILLAT

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
803Data mining / Database theory / Database management systems / Relational database management systems / Cross-site scripting / SQL injection / Anomaly detection / Cluster analysis / Null / Data management / Statistics / Computing

Masibty: an anomaly based intrusion prevention system for web applications Claudio Criscione Secure Network Srl [removed] Stefano Zanero

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
804.NET assembly / Managed Extensions for C++ / Visual Basic .NET / Hooking / Dynamic-link library / ILAsm / Rootkit / Global Assembly Cache / Windows API / Computing / Software / .NET framework

Microsoft Word - .NET Framework rootkits - backdoors inside your framework - revised.doc

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
805Biometrics / Data security / Information sensitivity / Passports / Radio-frequency identification / Beek /  Ubbergen / Security / National security / Biometric passport

Microsoft PowerPoint - bh-eu-09-van_beek.ppt [Compatibility Mode]

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
806Malware / OO / Tor / Badbunny / Cryptographic primitive / Macintosh / Software / Portable software / OpenOffice.org

[removed] OpenOffice v3.x Security Design Weaknesses Eric Filiol [removed]

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
807Memory management / Debuggers / Profilers / Valgrind / C dynamic memory allocation / Low-level programming language / C / Stack / Computing / Computer programming / Software engineering

Shuntaint: Emulation-based Security Testing for Formal Verification Bruno Luiz [removed]

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
808Routing protocols / Internet standards / Border Gateway Protocol / Router / MD5 / IP hijacking / Internet / Network architecture / Computing

All your packets are belong to us – Attacking backbone technologies Daniel Mende & Enno Rey {dmende, erey}@ernw.de

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
809Data types / Primitive types / Debuggers / Software bugs / Profilers / Valgrind / Pointer / C / Stack / Computing / Software engineering / Computer programming

Shuntaint: Emulation-based Security Testing for Formal Verification Bruno Luiz [removed]

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
810Computer security / Stack buffer overflow / Buffer overflow / Shellcode / Address space layout randomization / Stack / Pointer / PaX / Heap overflow / Software bugs / Computing / Software quality

\x90\x90\x90\x90\x90\x90\x90\x90 Stack Smashing as of Today A State-of-the-Art Overview on Buffer Overflow Protections

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
UPDATE