Index of /docs/Slides/2014

Icon  Name                                                                                                   Last modified      Size  Description
[PARENTDIR] Parent Directory - [   ] Mobile_SSL_Failures_-_Tony_Trummer_Tushar_Dalvi.pdf 2014-12-10 17:04 39M [   ] TextSecure_and_RedPhone-bring_them_to_iOS_-_Christine_Corbett.pdf 2014-12-10 16:12 17M [   ] Suricata_Intrusion_Detection_-_Victor_Julien.pdf 2014-12-30 09:05 12M [   ] Trusting_Your_Cloud_Provider:_Protecting_Private_Virtual_Machines_-_Armin_Simma.pdf 2014-12-02 13:06 11M [   ] Cognitive_Bias_and_Critical_Thinking_in_Open_Source_Intelligence_(OSINT)_-_Benjamin_Brown.pdf 2014-12-04 22:48 8.9M [   ] Cyber_Security_Information_Sharing_-_Oscar_Serrano.pdf 2014-12-02 15:13 8.6M [   ] An_innovative_and_comprehensive_Framework_for_Social_Vulnerability_Assessment_-_Frumento_Puricelli.pdf 2014-12-02 13:28 4.9M [   ] Political_Solutions_to_Technical_Challenges_-_Linus_Neumann.pdf 2014-12-02 12:56 3.6M [   ] MLD_Considered_Harmful_-_Atlasis_Rey_Salazar.pdf 2014-12-16 10:36 3.4M [   ] SAP_BusinessObjects_Attacks_-_J_P_Etchegoyen.pdf 2014-12-17 10:16 3.1M [   ] The_IPv6_Snort_Plugin_-_Martin_Schütte.pdf 2014-12-16 12:52 2.8M [   ] Social_Authentication_-_Vulnerabilities,_Mitigations,_and_Redesign_-_Marco_Lancini.pdf 2014-12-02 13:17 1.9M [   ] Bending and Twisting Networks_Paul_Coggin.pdf 2014-12-03 16:16 1.9M [   ] Trap_a_Bot_for_Fun_and_Profit_-_Attila_Marosi.pdf 2014-12-16 12:35 1.8M [   ] Build_Yourself_a_Risk_Assessment_Tool_-_Vlado_Luknar.pdf 2014-12-10 11:33 1.5M [   ] Safer_Six_-_IPv6_Security_in_a_Nutshell_-_Johanna_Ullrich.pdf 2014-12-16 10:29 1.4M [   ] Creating_a_kewl_and_simple_Cheating_Platform_on_Android_-_Milan_Gabor-Danijel_Grah.pdf 2014-12-10 12:31 1.2M [   ] Why_Antivirus_Fails_-_Daniel_Sauder.pdf 2014-12-03 10:47 1.2M [   ] A_Myth_or_Reality___BIOS-based_Hypervisor_Threat_-_Mikhail_Utin.pdf 2014-11-21 13:31 1.2M [   ] Java's_SSLSocket_-_How_Bad_APIs_Compromise_Security_-_Georg_Lukas.pdf 2014-12-02 13:15 1.2M [   ] Cloud-based_Data_Validation_Patterns_-_Geoffrey_Hill.pdf 2014-12-16 10:41 961K [   ] Introduction_to_and_Survey_of_TLS_Security_-_Aaron_Zauner.pdf 2015-01-27 17:05 585K [   ] On the Effectiveness of Full-ASLR on 64-bit Linux_Hector_Marco.pdf 2014-12-03 13:58 563K [   ] New Bleichenbacher Side Channels and Attacks_Juraj_Somorovsky.pdf 2014-12-04 11:41 558K [   ] Client_Side_Attacks_PowerShell_Nikhil_Mittal.pdf 2014-12-04 15:20 512K [   ] Why_IT_Security_Is_Fucked_Up_-_Stefan_Schuhmacher.pdf 2014-12-02 13:31 476K