| Browser Exploits - Attacks and Defense |
Saumil Shah |
Presentation |
- |
| Discovering permanent denial of service attacks against embedded systems |
Rich Smith |
Presentation |
- |
| Satellite Systems |
Adam Laurie |
Presentation |
- |
| Phoenix, and automated vulnerability finding |
Tim Burrell |
Presentation |
- |
| Building the bridge between the Web Application and the OS: GUI access through SQL Injection |
Alberto Revelli |
Presentation |
- |
| WebSphere MQ Security |
Martyn Ruks |
Presentation |
- |
| Cisco IOS Rootkits |
Sebastian Muņiz |
Presentation |
Paper |
| Attacking Near Field Communications (NFC) Mobile Phones |
Collin Mulliner |
Presentation |
- |
| Abusing X.509 certificate features |
Alexander Klink |
Presentation |
- |
| One Token to Rule Them All: Post-Exploitation Fun in Windows Environments |
Luke Jennings |
Presentation |
- |
| Advances in attacking interpreted languages |
Justin Ferguson |
Presentation |
- |
| Synthesizing PDF Attacks |
Aditya K Sood |
Presentation |
- |