CONFidence2014 day 1
CONFidenceITSeC
CONFidence2014 day 1
1:16
CONFidence2014 making of
CONFidenceITSeC
CONFidence2014 making of
0:44
CONFIdence 2013
CONFidenceITSeC
CONFIdence 2013
2:40
Rebecca Bx Shapiro, Julian Bangert, Sergey Bratus Any Input Is a Program Weird Machines in ABI
CONFidenceITSeC
Rebecca Bx Shapiro, Julian Bangert, Sergey Bratus Any Input Is a Program Weird Machines in ABI
44:51
Yaniv Miron, MC   Ph0k 0 days, We Will Pwn U with Hardware Mofos
CONFidenceITSeC
Yaniv Miron, MC Ph0k 0 days, We Will Pwn U with Hardware Mofos
45:43
Gynvael Coldwind, Mateusz "j00ru" Jurczyk  Beyond MOV ADD XOR -- the unusual and unexpected in x86
CONFidenceITSeC
Gynvael Coldwind, Mateusz "j00ru" Jurczyk Beyond MOV ADD XOR -- the unusual and unexpected in x86
1:03:24
Julian Bangert, Sergey Bratus -- ELF Eccentricities
CONFidenceITSeC
Julian Bangert, Sergey Bratus -- ELF Eccentricities
44:57
Nguyen Anh Quynh -- Opticode machine code deobfuscation for malware analysts
CONFidenceITSeC
Nguyen Anh Quynh -- Opticode machine code deobfuscation for malware analysts
40:02
Nikita Tarakanov -- Exploiting Hardcore Pool Corruptions in Microsoft Windows Kernel
CONFidenceITSeC
Nikita Tarakanov -- Exploiting Hardcore Pool Corruptions in Microsoft Windows Kernel
30:07
Mariusz Sawczuk, Jochen Belke -- Invisible attacks -- visible in your network
CONFidenceITSeC
Mariusz Sawczuk, Jochen Belke -- Invisible attacks -- visible in your network
50:15
Grzegorz Niemirowski - Desktop applications vulnerabilities
CONFidenceITSeC
Grzegorz Niemirowski - Desktop applications vulnerabilities
48:29
Fernando Gont - Network Reconnaissance in IPv6 Networks
CONFidenceITSeC
Fernando Gont - Network Reconnaissance in IPv6 Networks
50:22
Ilja van Sprudel -- Linux Desktop Insecurity
CONFidenceITSeC
Ilja van Sprudel -- Linux Desktop Insecurity
48:17
Felix "fx" Lindner, Gregor Kopf -- Cisco in the Sky with Diamonds
CONFidenceITSeC
Felix "fx" Lindner, Gregor Kopf -- Cisco in the Sky with Diamonds
51:01
Meredith L  Patterson -- LANGSEC 2011 2016
CONFidenceITSeC
Meredith L Patterson -- LANGSEC 2011 2016
40:10
Jesse Burns -- Securing Data in Mobile Application Suites
CONFidenceITSeC
Jesse Burns -- Securing Data in Mobile Application Suites
45:26
Georgia Weidman Can You Hear Me Now Leveraging Mobile Devices on Pentests
CONFidenceITSeC
Georgia Weidman Can You Hear Me Now Leveraging Mobile Devices on Pentests
48:25
Michał Sajdak Embedded Devices Hacking
CONFidenceITSeC
Michał Sajdak Embedded Devices Hacking
36:41
Robert Lipovski The "Facebook PokerAgent"
CONFidenceITSeC
Robert Lipovski The "Facebook PokerAgent"
26:26
Yury Chemerkin Insecurities in blackberry
CONFidenceITSeC
Yury Chemerkin Insecurities in blackberry
36:14
Gaweł Mikołajczyk Networking Security Treasures
CONFidenceITSeC
Gaweł Mikołajczyk Networking Security Treasures
54:29
Adam Zabrocki - Crashdumps hunt 0days and rootkits
CONFidenceITSeC
Adam Zabrocki - Crashdumps hunt 0days and rootkits
49:33
Arseny Reutov - PHP Object Injection revisted
CONFidenceITSeC
Arseny Reutov - PHP Object Injection revisted
39:54
Evgeny Neyolov & Dmitriy Chastuchin Breaking, Forensicating and Anti Forensicating SAP Portal and J2
CONFidenceITSeC
Evgeny Neyolov & Dmitriy Chastuchin Breaking, Forensicating and Anti Forensicating SAP Portal and J2
44:48
Devesh Bhatt My Experiments with truth a different route to bug hunting
CONFidenceITSeC
Devesh Bhatt My Experiments with truth a different route to bug hunting
38:32