Showing posts with label
Black Hat USA 2015
.
Show all posts
Showing posts with label
Black Hat USA 2015
.
Show all posts
Monday, July 25, 2016
BREAKING HTTPS WITH BGP HIJACKING
›
BREAKING HTTPS WITH BGP HIJACKING By Artyom Gavrichenkov Qrator Labs (ag@qrator.net)
Understanding and Managing Entropy Usage
›
INTERNET PLUMBING FOR SECURITY PROFESSIONALS: THE STATE OF BGP SECURITY
›
INTERNET PLUMBING FOR SECURITY PROFESSIONALS: THE STATE OF BGP SECURITY By Wim Remes – Rapid7
Exploiting the DRAM rowhammer bug to gain kernel privileges
›
Exploiting the DRAM rowhammer bug to gain kernel privileges Mark Seaborn, sandbox builder and breaker with contributions by Thomas Dull...
Exploiting Trustzone on Android
›
Exploiting Trustzone on Android By Di Shen(@returnsme) retme7@gmail.com
Attacking ECMAScript Engines with Redefinition
›
Attacking ECMAScript Engines with Redefinition By Natalie Silvanovich, Google
XXE defence(les)s in JDK XML parsers
›
XXE defence(les)s in JDK XML parsers By Sergey Gorbaty sergey.gorbaty@salesforce.com Xiaoran Wang xiaoran.wang@salesforce.com Horma...
The Applications of Deep Learning on Traffic Identification
›
The Applications of Deep Learning on Traffic Identification By Zhanyi Wang (wangzhanyi@360.cn)
ROPInjector: Using Return- Oriented Programming for Polymorphism and AV Evasion
›
ROPInjector: Using Return-Oriented Programming for Polymorphism and AV Evasion by G. Poulios, C. Ntantogian, C. Xenakis
BYPASS CONTROL FLOW GUARD COMPREHENSIVELY
›
BYPASS CONTROL FLOW GUARD COMPREHENSIVELY by Zhang Yunhai
›
Home
View web version