1 |
|
Thar' Be Vuln. Id's Here - A Data Mining Case Study |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
1743 |
None |
2 |
|
Pip: Remotely Injecting Phy-Layer Packets Without A Bug Or Your Radio |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
1552 |
None |
3 |
|
Reverse Engineering A Mass Transit Ticketing System |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
2539 |
None |
4 |
|
Bluetooth Packet Sniffing Using Project Ubertooth |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
4917 |
None |
5 |
|
Tracking Vulnerable Jars |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
1567 |
None |
6 |
|
A Tale Of Two Firefox Bugs |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
2012 |
None |
7 |
|
How To Catch A Chameleon: Its All In Your Heap |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
1507 |
None |
8 |
|
Hardware Backdooring Is Practical |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
1941 |
None |
9 |
|
Ssl Traffic Analysis Attacks - Vincent Berg |
10 years, 10 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
1886 |
None |
10 |
|
Ios And Android Application Security |
10 years, 10 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
1656 |
None |
11 |
|
Automated Detection Of Software Bugs And Vulnerabilities In Linux |
10 years, 10 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
1870 |
None |
12 |
|
An Embarrassingly Simple Solution To The Problem Of Protecting Browser Users |
10 years, 10 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
1121 |
None |
13 |
|
Mobile And Contactless Payment Security |
10 years, 10 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
1433 |
None |
14 |
|
Detecting Source Code Re-Use Through Metadata And Context Partial Hashing - Daniel Cabezas |
10 years, 7 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
1400 |
None |
15 |
|
Advanced Persistent Response |
10 years, 7 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
1148 |
None |
16 |
|
Binary Instrumentation For Android - Collin Mulliner |
10 years, 7 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
1489 |
None |
17 |
|
Finding Needles In Haystacks (The Size Of Countries) - Michael Baker |
10 years, 7 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
1521 |
None |
18 |
|
Exploiting Internal Network Vulns Via The Browser Using Beef Bind - Ty Miller &Amp; Michele Orru |
10 years, 7 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
2722 |
None |
19 |
|
The Impacts Of Advancing Technology On Computer Forensics And E-Discovery - Adam Daniel |
10 years, 7 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
1434 |
None |
20 |
|
The 3 Rings Of The Data Breach Circus - Mark Goudie |
10 years, 7 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
1229 |
None |
21 |
|
Foocodechu For Software Analysis, Malware Detection And Vuln Research - Silvio Cesare |
10 years, 7 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
1713 |
None |
22 |
|
Practical Attacks On Payment Gateways - Eldar Marcussen |
10 years, 7 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
3324 |
None |
23 |
|
De Mysteriis Dom Jobsivs: Mac Efi Rootkits - Snare |
10 years, 7 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
1587 |
None |
24 |
|
Ruxcon 2012 Panel |
10 years, 7 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
841 |
None |
25 |
|
Defibrillating Web Security - Meder Kydyraliev |
10 years, 7 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
1367 |
None |
26 |
|
Thar' Be Vuln. Id's Here - A Data Mining Case Study Matt Jones |
10 years, 7 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, ruxcon-2012 |
1364 |
None |