Slides

Presentation Speaker Slides

Hacking Humans

Barnaby Jack

spacer

Not available

iOS6 Security

Mark Dowd

spacer

Slides

Modeling the exploitation and mitigation of memory safety vulns

Matt Miller

spacer

Slides

Advanced Exploitation of Mobile/Embedded Devices:the ARM Microprocessor

Stephen Ridley & Stephen Lawler

spacer

Slides

Binary Instrumentation For Android

Collin Mulliner

spacer

Slides

Radium: Auto Data Collection & Visualization in Maltego

Roelof Temmingh

spacer

Not available

Emulating DFU to Quickly Reverse and Exploit USB Devices

Travis Goodspeed

spacer

Slides

Detecting Bugs Using Decompilation and Dataflow Analysis

Silvio Cesare

spacer

Slides

Maverick: Adding the Apple Touch to Qualcomm's Baseband Bootrom

Eric McDonald (MuscleNerd)

spacer

Not available

Tackling the Android Challenge

Joshua Drake

spacer

Slides

Unravelling Windows 8 Security and the ARM Kernel

Alex Ionescu

spacer

Slides

Rootkit in your Laptop: Hidden Code in your Chipset

Igor Skochinsky

spacer

Slides

The Case for Semantics-Based Methods in Reverse Engineering

Rolf Rolles

spacer

Slides

Android Forensic Deep Dive

Bradley Schatz

spacer

Slides

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.