Index of /docs/Slides/2014
 Name                                                                                                   Last modified      Size  Description
 Parent Directory                                                                                                            -   
 A_Myth_or_Reality___BIOS-based_Hypervisor_Threat_-_Mikhail_Utin.pdf                                    2014-11-21 13:31  1.2M  
 An_innovative_and_comprehensive_Framework_for_Social_Vulnerability_Assessment_-_Frumento_Puricelli.pdf 2014-12-02 13:28  4.9M  
 Bending and Twisting Networks_Paul_Coggin.pdf                                                          2014-12-03 16:16  1.9M  
 Build_Yourself_a_Risk_Assessment_Tool_-_Vlado_Luknar.pdf                                               2014-12-10 11:33  1.5M  
 Client_Side_Attacks_PowerShell_Nikhil_Mittal.pdf                                                       2014-12-04 15:20  512K  
 Cloud-based_Data_Validation_Patterns_-_Geoffrey_Hill.pdf                                               2014-12-16 10:41  961K  
 Cognitive_Bias_and_Critical_Thinking_in_Open_Source_Intelligence_(OSINT)_-_Benjamin_Brown.pdf          2014-12-04 22:48  8.9M  
 Creating_a_kewl_and_simple_Cheating_Platform_on_Android_-_Milan_Gabor-Danijel_Grah.pdf                 2014-12-10 12:31  1.2M  
 Cyber_Security_Information_Sharing_-_Oscar_Serrano.pdf                                                 2014-12-02 15:13  8.6M  
 Introduction_to_and_Survey_of_TLS_Security_-_Aaron_Zauner.pdf                                          2015-01-27 17:05  585K  
 Java's_SSLSocket_-_How_Bad_APIs_Compromise_Security_-_Georg_Lukas.pdf                                  2014-12-02 13:15  1.2M  
 MLD_Considered_Harmful_-_Atlasis_Rey_Salazar.pdf                                                       2014-12-16 10:36  3.4M  
 Mobile_SSL_Failures_-_Tony_Trummer_Tushar_Dalvi.pdf                                                    2014-12-10 17:04   39M  
 New Bleichenbacher Side Channels and Attacks_Juraj_Somorovsky.pdf                                      2014-12-04 11:41  558K  
 On the Effectiveness of Full-ASLR on 64-bit Linux_Hector_Marco.pdf                                     2014-12-03 13:58  563K  
 Political_Solutions_to_Technical_Challenges_-_Linus_Neumann.pdf                                        2014-12-02 12:56  3.6M  
 SAP_BusinessObjects_Attacks_-_J_P_Etchegoyen.pdf                                                       2014-12-17 10:16  3.1M  
 Safer_Six_-_IPv6_Security_in_a_Nutshell_-_Johanna_Ullrich.pdf                                          2014-12-16 10:29  1.4M  
 Social_Authentication_-_Vulnerabilities,_Mitigations,_and_Redesign_-_Marco_Lancini.pdf                 2014-12-02 13:17  1.9M  
 Suricata_Intrusion_Detection_-_Victor_Julien.pdf                                                       2014-12-30 09:05   12M  
 TextSecure_and_RedPhone-bring_them_to_iOS_-_Christine_Corbett.pdf                                      2014-12-10 16:12   17M  
 The_IPv6_Snort_Plugin_-_Martin_Schütte.pdf                                                            2014-12-16 12:52  2.8M  
 Trap_a_Bot_for_Fun_and_Profit_-_Attila_Marosi.pdf                                                      2014-12-16 12:35  1.8M  
 Trusting_Your_Cloud_Provider:_Protecting_Private_Virtual_Machines_-_Armin_Simma.pdf                    2014-12-02 13:06   11M  
 Why_Antivirus_Fails_-_Daniel_Sauder.pdf                                                                2014-12-03 10:47  1.2M  
 Why_IT_Security_Is_Fucked_Up_-_Stefan_Schuhmacher.pdf                                                  2014-12-02 13:31  476K