Browser Exploits - Attacks and Defense |
Saumil Shah |
Presentation |
- |
Discovering permanent denial of service attacks against embedded systems |
Rich Smith |
Presentation |
- |
Satellite Systems |
Adam Laurie |
Presentation |
- |
Phoenix, and automated vulnerability finding |
Tim Burrell |
Presentation |
- |
Building the bridge between the Web Application and the OS: GUI access through SQL Injection |
Alberto Revelli |
Presentation |
- |
WebSphere MQ Security |
Martyn Ruks |
Presentation |
- |
Cisco IOS Rootkits |
Sebastian Muņiz |
Presentation |
Paper |
Attacking Near Field Communications (NFC) Mobile Phones |
Collin Mulliner |
Presentation |
- |
Abusing X.509 certificate features |
Alexander Klink |
Presentation |
- |
One Token to Rule Them All: Post-Exploitation Fun in Windows Environments |
Luke Jennings |
Presentation |
- |
Advances in attacking interpreted languages |
Justin Ferguson |
Presentation |
- |
Synthesizing PDF Attacks |
Aditya K Sood |
Presentation |
- |