Index of /docs/Audio/DeepSec_2013
Name Last modified Size Description
Parent Directory -
_DeepSec_2013_Applied_Crypto_Hardening_-_Aaron_Kaplan_et_al.mp3 2013-11-28 21:05 20M
_DeepSec_2013_Auditing_Virtual_Appliances_-_An_Untapped_Source_Of_0-days_-_Stefan_Viehböck.mp3 2013-11-28 21:33 15M
_DeepSec_2013_Automation_In_Android_and_iOS_Application_Security_Review_-_Hemil_Shah.mp3 2013-11-28 21:12 16M
_DeepSec_2013_Boomerang_Effect_-_Shay_Chen.mp3 2013-11-28 19:03 18M
_DeepSec_2013_Building_The_First_Android_IDS_On_Network_Level_-_Jaime_Sanchez.mp3 2013-11-28 21:22 13M
_DeepSec_2013_Bypassing_Security_Controls_With_Mobile_Devices_-_Georgia_Weidman.mp3 2013-11-28 19:09 15M
_DeepSec_2013_CSRFT_-_Paul_Amar.mp3 2013-11-28 19:20 15M
_DeepSec_2013_Closing.mp3 2013-11-28 18:56 3.5M
_DeepSec_2013_Cracking_And_Analyzing_Apple_iCloud_Protocols_-_Vladimir_Katalov.mp3 2013-11-28 21:36 19M
_DeepSec_2013_Cracking_Android_Containers_-_Chris_J_Riley.mp3 2013-11-28 19:15 21M
_DeepSec_2013_Cultural_Learning_Of_China_To_Make_Benefit_Glorious_Profession_Of_Infosec_-_Wim_Remes.mp3 2013-11-28 20:41 21M
_DeepSec_2013_Effective_IDS_Testing_-_Arron_Finux_Finnon.mp3 2013-11-28 19:30 22M
_DeepSec_2013_Europe_In_The_Carna_Botnet_-_Parth_Shukla.mp3 2013-11-28 21:43 15M
_DeepSec_2013_Exploiting_Supercomputers_-_MWR.mp3 2013-11-28 19:45 21M
_DeepSec_2013_FedRAMP_-_Mikhail_Utin.mp3 2013-11-28 19:55 17M
_DeepSec_2013_Future_Banking_And_Financial_Attacks_-_Konstantinos_Karagiannis.mp3 2013-11-28 20:06 16M
_DeepSec_2013_HTML5_Is_Securer_Than_You_Think_-_Sebastian_Lekies.mp3 2013-11-28 20:26 18M
_DeepSec_2013_Hackanalytics_-_Alexey_Kachalin.mp3 2013-11-28 20:10 22M
_DeepSec_2013_Hacking_Medical_Devices_-_Florian_Grunow.mp3 2013-11-28 21:29 23M
_DeepSec_2013_Historical_Tour_Of_IDS_Evasion,_Insertions,_and_Other_Oddities_-_Arron_Finux_Finnon.mp3 2013-11-28 20:20 21M
_DeepSec_2013_Malware_Datamining_-_Michael_Boman.mp3 2013-11-28 20:31 17M
_DeepSec_2013_Opening.mp3 2013-11-28 20:37 2.6M
_DeepSec_2013_Pivoting_in_Amazon_Clouds_-_Andres_Riancho.mp3 2013-11-28 20:48 20M
_DeepSec_2013_Prism_Break_-_Frank_Ackermann.mp3 2013-11-28 20:54 15M
_DeepSec_2013_Psychology_of_Security_-_Stefan_Schumacher.mp3 2013-11-28 20:59 19M
_DeepSec_2013_Risk_Assessment_For_External_Vendors_-_Luciano_Ferrari.mp3 2013-11-28 20:01 15M
_DeepSec_2013_Static_Data_Leak_Prevention_In_SAP_-_Andreas_Wiegenstein.mp3 2013-11-28 21:53 16M
_DeepSec_2013_Static_Instrumentation_For_Binary_Reverse-Engineering_-_David_Guillen_Fandos.mp3 2013-11-28 21:57 19M
_DeepSec_2013_The_Dark_Side_of_the_Internet_-_Moritz_Schafhuber.mp3.gpg 2013-11-29 14:13 5.0M
_DeepSec_2013_The_Economics_Of_False_Positives_-_Gavin_Ewan.mp3 2013-11-28 22:04 18M
_DeepSec_2013_Top_10_Security_Mistakes_In_Software_-_Peter_af_Geijerstam.mp3 2013-11-28 22:09 17M
_DeepSec_2013_Trusted_Friend_Attack_-_Ashar_Javed.mp3 2013-11-28 22:13 16M
_DeepSec_2013_Uncovering your trails - Privacy issues of bluetooth devices_-_Verónica_Valeros__García_Sebastian.mp3 2013-11-28 21:18 19M
_DeepSec_2013_Using Memory, Filesystems And Runtime To App Pen iOS And Android_-_Andre_Gironda.mp3 2013-11-28 21:47 15M