CONFidenceITSeC
CONFidence2014 day 1
1:16
CONFidenceITSeC
CONFidence2014 making of
0:44
CONFidenceITSeC
CONFIdence 2013
2:40
CONFidenceITSeC
Rebecca Bx Shapiro, Julian Bangert, Sergey Bratus Any Input Is a Program Weird Machines in ABI
44:51
CONFidenceITSeC
Yaniv Miron, MC Ph0k 0 days, We Will Pwn U with Hardware Mofos
45:43
CONFidenceITSeC
Gynvael Coldwind, Mateusz "j00ru" Jurczyk Beyond MOV ADD XOR -- the unusual and unexpected in x86
1:03:24
CONFidenceITSeC
Julian Bangert, Sergey Bratus -- ELF Eccentricities
44:57
CONFidenceITSeC
Nguyen Anh Quynh -- Opticode machine code deobfuscation for malware analysts
40:02
CONFidenceITSeC
Nikita Tarakanov -- Exploiting Hardcore Pool Corruptions in Microsoft Windows Kernel
30:07
CONFidenceITSeC
Mariusz Sawczuk, Jochen Belke -- Invisible attacks -- visible in your network
50:15
CONFidenceITSeC
Grzegorz Niemirowski - Desktop applications vulnerabilities
48:29
CONFidenceITSeC
Fernando Gont - Network Reconnaissance in IPv6 Networks
50:22
CONFidenceITSeC
Ilja van Sprudel -- Linux Desktop Insecurity
48:17
CONFidenceITSeC
Felix "fx" Lindner, Gregor Kopf -- Cisco in the Sky with Diamonds
51:01
CONFidenceITSeC
Meredith L Patterson -- LANGSEC 2011 2016
40:10
CONFidenceITSeC
Jesse Burns -- Securing Data in Mobile Application Suites
45:26
CONFidenceITSeC
Georgia Weidman Can You Hear Me Now Leveraging Mobile Devices on Pentests
48:25
CONFidenceITSeC
Michał Sajdak Embedded Devices Hacking
36:41
CONFidenceITSeC
Robert Lipovski The "Facebook PokerAgent"
26:26
CONFidenceITSeC
Yury Chemerkin Insecurities in blackberry
36:14
CONFidenceITSeC
Gaweł Mikołajczyk Networking Security Treasures
54:29
CONFidenceITSeC
Adam Zabrocki - Crashdumps hunt 0days and rootkits
49:33
CONFidenceITSeC
Arseny Reutov - PHP Object Injection revisted
39:54
CONFidenceITSeC
Evgeny Neyolov & Dmitriy Chastuchin Breaking, Forensicating and Anti Forensicating SAP Portal and J2
44:48
CONFidenceITSeC
Devesh Bhatt My Experiments with truth a different route to bug hunting
38:32