"Shatter"ing the Windows Message Passing Architecture and Security Model
Event type
: Lecture
Track
: Main
|
|
"egg" - A Stealth fine grained code analyzer
Event type
: Lecture
Track
: Main
|
|
Abusing Hardware Defined Radios
Event type
: Lecture
Track
: Main
|
|
Advances in rootkit technology - Atmosphere
A network-covert, remote FreeBSD hidden kernel-thread rootkit
Event type
: Lecture
Track
: Main
|
|
AndBug -- A Scriptable Debugger for Android's Dalvik Virtual Machine
Event type
: Lecture
Track
: Main
|
|
Binary Literacy: Static Reverse Engineering
Event type
: Workshop
|
|
Binary Literacy: Static Reverse Engineering
Event type
: Workshop
|
|
Binary Literacy: Static Reverse Engineering
Event type
: Workshop
|
|
Binary Literacy: Static Reverse Engineering
Event type
: Workshop
|
|
Binary Literacy: Static Reverse Engineering
Event type
: Workshop
|
|
Binary Literacy: Static Reverse Engineering
Event type
: Workshop
|
|
Binary Literacy: Static Reverse Engineering
Event type
: Workshop
|
|
Binary Literacy: Static Reverse Engineering
Event type
: Workshop
|
|
Binary Literacy: Static Reverse Engineering
Event type
: Workshop
|
|
Binary Literacy: Static Reverse Engineering
Event type
: Workshop
|
|
Binary Literacy: Static Reverse Engineering
Event type
: Workshop
|
|
Binary Literacy: Static Reverse Engineering
Event type
: Workshop
|
|
Breakfast
|
|
Breakfast
|
|
Breakfast
|
|
Bug Hunting and Analysis 0x65
Event type
: Workshop
|
|
Bug Hunting and Analysis 0x65
Event type
: Workshop
|
|
Bug Hunting and Analysis 0x65
Event type
: Workshop
|
|
Bug Hunting and Analysis 0x65
Event type
: Workshop
|
|
Bug Hunting and Analysis 0x65
Event type
: Workshop
|
|
Bug Hunting and Analysis 0x65
Event type
: Workshop
|
|
Bug Hunting and Analysis 0x65
Event type
: Workshop
|
|
Bug Hunting and Analysis 0x65
Event type
: Workshop
|
|
Bug Hunting and Analysis 0x65
Event type
: Workshop
|
|
Bug Hunting and Analysis 0x65
Event type
: Workshop
|
|
Bug Hunting and Analysis 0x65
Event type
: Workshop
|
|
Bug Hunting and Analysis 0x65
Event type
: Workshop
|
|
Checkpoint-Restart: Proprietary Hardware and the "Spiderweb API"
Event type
: Lecture
Track
: Main
|
|
Closure Ceremony
Event type
: Lecture
Track
: Main
|
|
Conference Opening
Event type
: Lecture
Track
: Main
|
|
Decompiling kernel drivers and IDA plugins
Event type
: Lecture
Track
: Main
|
|
Designing a minimal operating system to emulate 32/64bits x86 code snippets, shellcode or malware in Bochs
Event type
: Lecture
Track
: Main
|
|
Ghetto Tools for Embedded Analysis
Automated JTAG/serial scanning, building your own FLASH programmer, re-documenting IC's.
Event type
: Lecture
Track
: Main
|
|
Hacking Microsoft RDP for Fun and Profit
Post-exploitation the easy way
Event type
: Lecture
Track
: Main
|
|
Hardware Stuff for Software People
|
|
Holistic RFID Hacking
Event type
: Workshop
|
|
Holistic RFID Hacking
Event type
: Workshop
|
|
Holistic RFID Hacking
Event type
: Workshop
|
|
Holistic RFID Hacking
Event type
: Workshop
|
|
How to develop a rootkit for Broadcom NetExtreme network cards
Event type
: Lecture
Track
: Main
|
|
Internet filtering
Event type
: Lecture
Track
: Main
|
|
Lunch
|
|
Lunch
|
|
Lunch
|
|
Mach shellcodes and OS X injectable rootkits
Event type
: Lecture
Track
: Main
|
|
Memory Eye
Event type
: Lecture
Track
: Main
|
|
Practical C++ decompilation
Event type
: Lecture
Track
: Main
|
|
Pre-Registration
|
|
RFID Hacking
Event type
: Lecture
Track
: Main
|
|
Registration and Breakfast
Event type
: Other
|
|
Reverse engineering software protections
Event type
: Workshop
|
|
Reverse engineering software protections
Event type
: Workshop
|
|
Reverse engineering software protections
Event type
: Workshop
|
|
Reverse engineering software protections
Event type
: Workshop
|
|
Reversing software compressions: Tale of dragons and men who slay them
Event type
: Lecture
Track
: Main
|
|
Sticky Fingers & KBC Custom Shop
Fun at low-level
Event type
: Lecture
Track
: Main
|
|
The Future of Social Engineering
Event type
: Lecture
Track
: Main
|
|
The Importance of Making a Good Impression
The Art of Lock Impressioning
Event type
: Lecture
Track
: Main
|
|
The exploit laboratory Advanced Edition
Event type
: Workshop
|
|
The exploit laboratory Advanced Edition
Event type
: Workshop
|
|
The exploit laboratory Advanced Edition
Event type
: Workshop
|
|
The exploit laboratory Advanced Edition
Event type
: Workshop
|
|
Training Registration
Event type
: Other
|
|
Training Registration
Event type
: Other
|
|
Virtdbg
Remote kernel debugging using hardware virtualisation features
Event type
: Lecture
Track
: Main
|
|
Windows Internals for Reverse Engineers
Event type
: Workshop
|
|
Windows Internals for Reverse Engineers
Event type
: Workshop
|
|
Windows Internals for Reverse Engineers
Event type
: Workshop
|
|
Windows Internals for Reverse Engineers
Event type
: Workshop
|
|
Windows Internals for Reverse Engineers
Event type
: Workshop
|
|
Windows Internals for Reverse Engineers
Event type
: Workshop
|
|
Windows Internals for Reverse Engineers
Event type
: Workshop
|
|
Windows Internals for Reverse Engineers
Event type
: Workshop
|
|
Windows Internals for Reverse Engineers
Event type
: Workshop
|
|
Windows Internals for Reverse Engineers
Event type
: Workshop
|
|
Windows Internals for Reverse Engineers
Event type
: Workshop
|
|
Windows Internals for Reverse Engineers
Event type
: Workshop
|
|