Index of /docs/Slides/2014
 Name                                                                                                   Last modified      Size  Description
 Name                                                                                                   Last modified      Size  Description
![[PARENTDIR]](/icons/back.gif) Parent Directory                                                                                                            -
 Parent Directory                                                                                                            -   
![[   ]](/icons/layout.gif) A_Myth_or_Reality___BIOS-based_Hypervisor_Threat_-_Mikhail_Utin.pdf                                    2014-11-21 13:31  1.2M
 A_Myth_or_Reality___BIOS-based_Hypervisor_Threat_-_Mikhail_Utin.pdf                                    2014-11-21 13:31  1.2M  
![[   ]](/icons/layout.gif) Political_Solutions_to_Technical_Challenges_-_Linus_Neumann.pdf                                        2014-12-02 12:56  3.6M
 Political_Solutions_to_Technical_Challenges_-_Linus_Neumann.pdf                                        2014-12-02 12:56  3.6M  
![[   ]](/icons/layout.gif) Trusting_Your_Cloud_Provider:_Protecting_Private_Virtual_Machines_-_Armin_Simma.pdf                    2014-12-02 13:06   11M
 Trusting_Your_Cloud_Provider:_Protecting_Private_Virtual_Machines_-_Armin_Simma.pdf                    2014-12-02 13:06   11M  
![[   ]](/icons/layout.gif) Java's_SSLSocket_-_How_Bad_APIs_Compromise_Security_-_Georg_Lukas.pdf                                  2014-12-02 13:15  1.2M
 Java's_SSLSocket_-_How_Bad_APIs_Compromise_Security_-_Georg_Lukas.pdf                                  2014-12-02 13:15  1.2M  
![[   ]](/icons/layout.gif) Social_Authentication_-_Vulnerabilities,_Mitigations,_and_Redesign_-_Marco_Lancini.pdf                 2014-12-02 13:17  1.9M
 Social_Authentication_-_Vulnerabilities,_Mitigations,_and_Redesign_-_Marco_Lancini.pdf                 2014-12-02 13:17  1.9M  
![[   ]](/icons/layout.gif) An_innovative_and_comprehensive_Framework_for_Social_Vulnerability_Assessment_-_Frumento_Puricelli.pdf 2014-12-02 13:28  4.9M
 An_innovative_and_comprehensive_Framework_for_Social_Vulnerability_Assessment_-_Frumento_Puricelli.pdf 2014-12-02 13:28  4.9M  
![[   ]](/icons/layout.gif) Why_IT_Security_Is_Fucked_Up_-_Stefan_Schuhmacher.pdf                                                  2014-12-02 13:31  476K
 Why_IT_Security_Is_Fucked_Up_-_Stefan_Schuhmacher.pdf                                                  2014-12-02 13:31  476K  
![[   ]](/icons/layout.gif) Cyber_Security_Information_Sharing_-_Oscar_Serrano.pdf                                                 2014-12-02 15:13  8.6M
 Cyber_Security_Information_Sharing_-_Oscar_Serrano.pdf                                                 2014-12-02 15:13  8.6M  
![[   ]](/icons/layout.gif) Why_Antivirus_Fails_-_Daniel_Sauder.pdf                                                                2014-12-03 10:47  1.2M
 Why_Antivirus_Fails_-_Daniel_Sauder.pdf                                                                2014-12-03 10:47  1.2M  
![[   ]](/icons/layout.gif) On the Effectiveness of Full-ASLR on 64-bit Linux_Hector_Marco.pdf                                     2014-12-03 13:58  563K
 On the Effectiveness of Full-ASLR on 64-bit Linux_Hector_Marco.pdf                                     2014-12-03 13:58  563K  
![[   ]](/icons/layout.gif) Bending and Twisting Networks_Paul_Coggin.pdf                                                          2014-12-03 16:16  1.9M
 Bending and Twisting Networks_Paul_Coggin.pdf                                                          2014-12-03 16:16  1.9M  
![[   ]](/icons/layout.gif) New Bleichenbacher Side Channels and Attacks_Juraj_Somorovsky.pdf                                      2014-12-04 11:41  558K
 New Bleichenbacher Side Channels and Attacks_Juraj_Somorovsky.pdf                                      2014-12-04 11:41  558K  
![[   ]](/icons/layout.gif) Client_Side_Attacks_PowerShell_Nikhil_Mittal.pdf                                                       2014-12-04 15:20  512K
 Client_Side_Attacks_PowerShell_Nikhil_Mittal.pdf                                                       2014-12-04 15:20  512K  
![[   ]](/icons/layout.gif) Cognitive_Bias_and_Critical_Thinking_in_Open_Source_Intelligence_(OSINT)_-_Benjamin_Brown.pdf          2014-12-04 22:48  8.9M
 Cognitive_Bias_and_Critical_Thinking_in_Open_Source_Intelligence_(OSINT)_-_Benjamin_Brown.pdf          2014-12-04 22:48  8.9M  
![[   ]](/icons/layout.gif) Build_Yourself_a_Risk_Assessment_Tool_-_Vlado_Luknar.pdf                                               2014-12-10 11:33  1.5M
 Build_Yourself_a_Risk_Assessment_Tool_-_Vlado_Luknar.pdf                                               2014-12-10 11:33  1.5M  
![[   ]](/icons/layout.gif) Creating_a_kewl_and_simple_Cheating_Platform_on_Android_-_Milan_Gabor-Danijel_Grah.pdf                 2014-12-10 12:31  1.2M
 Creating_a_kewl_and_simple_Cheating_Platform_on_Android_-_Milan_Gabor-Danijel_Grah.pdf                 2014-12-10 12:31  1.2M  
![[   ]](/icons/layout.gif) TextSecure_and_RedPhone-bring_them_to_iOS_-_Christine_Corbett.pdf                                      2014-12-10 16:12   17M
 TextSecure_and_RedPhone-bring_them_to_iOS_-_Christine_Corbett.pdf                                      2014-12-10 16:12   17M  
![[   ]](/icons/layout.gif) Mobile_SSL_Failures_-_Tony_Trummer_Tushar_Dalvi.pdf                                                    2014-12-10 17:04   39M
 Mobile_SSL_Failures_-_Tony_Trummer_Tushar_Dalvi.pdf                                                    2014-12-10 17:04   39M  
![[   ]](/icons/layout.gif) Safer_Six_-_IPv6_Security_in_a_Nutshell_-_Johanna_Ullrich.pdf                                          2014-12-16 10:29  1.4M
 Safer_Six_-_IPv6_Security_in_a_Nutshell_-_Johanna_Ullrich.pdf                                          2014-12-16 10:29  1.4M  
![[   ]](/icons/layout.gif) MLD_Considered_Harmful_-_Atlasis_Rey_Salazar.pdf                                                       2014-12-16 10:36  3.4M
 MLD_Considered_Harmful_-_Atlasis_Rey_Salazar.pdf                                                       2014-12-16 10:36  3.4M  
![[   ]](/icons/layout.gif) Cloud-based_Data_Validation_Patterns_-_Geoffrey_Hill.pdf                                               2014-12-16 10:41  961K
 Cloud-based_Data_Validation_Patterns_-_Geoffrey_Hill.pdf                                               2014-12-16 10:41  961K  
![[   ]](/icons/layout.gif) Trap_a_Bot_for_Fun_and_Profit_-_Attila_Marosi.pdf                                                      2014-12-16 12:35  1.8M
 Trap_a_Bot_for_Fun_and_Profit_-_Attila_Marosi.pdf                                                      2014-12-16 12:35  1.8M  
![[   ]](/icons/layout.gif) The_IPv6_Snort_Plugin_-_Martin_Schütte.pdf                                                            2014-12-16 12:52  2.8M
 The_IPv6_Snort_Plugin_-_Martin_Schütte.pdf                                                            2014-12-16 12:52  2.8M  
![[   ]](/icons/layout.gif) SAP_BusinessObjects_Attacks_-_J_P_Etchegoyen.pdf                                                       2014-12-17 10:16  3.1M
 SAP_BusinessObjects_Attacks_-_J_P_Etchegoyen.pdf                                                       2014-12-17 10:16  3.1M  
![[   ]](/icons/layout.gif) Suricata_Intrusion_Detection_-_Victor_Julien.pdf                                                       2014-12-30 09:05   12M
 Suricata_Intrusion_Detection_-_Victor_Julien.pdf                                                       2014-12-30 09:05   12M  
![[   ]](/icons/layout.gif) Introduction_to_and_Survey_of_TLS_Security_-_Aaron_Zauner.pdf                                          2015-01-27 17:05  585K
 Introduction_to_and_Survey_of_TLS_Security_-_Aaron_Zauner.pdf                                          2015-01-27 17:05  585K