Catching DNS Tunnels with AI - A Talk About Artificial Intelligence, Geometry and Malicious Traffic
Binary Obfuscation from the Top-Down: Obfuscating Executables Without Writing Assembly
Cross Site Scripting Anonymous Browser 2.0
Cloud Security in Map/Reduce
Socially Owned in the Cloud
Deblaze - A Remote Method Enumeration Tool for Flex Servers
Attacking SMS. It's No Longer Your BFF
Advanced MySQL Exploitation
Proxy Prank-o-Matic
Session Donation
Stealing Profits from Stock Market Spammers or: How I learned to Stop Worrying and Love the Spam
Automated Malware Similarity Analysis
Injecting Electromagnetic Pulses into Digital Devices
Hacking UFOlogy 102: The Implications of UFOs for Life, the Universe, and Everything
Old Skool Brought Back: A 1964 Modem Demo
Air Traffic Control: Insecurity and ADS-B
Packing and the Friendly Skies
Design and Implementation of a Quantum True Random Number Generator
Unfair Use - Speculations on the Future of Piracy
Smashing the Stack with Hydra: The Many Heads of Advanced Polymorphic Shellcode
Hardware Trojans: Infiltrating the Faraday Cage
The Making of the second SQL injection Worm
Hacking the Smart Grid
Manipulation and Abuse of the Consumer Credit Reporting Agencies
An Open JTAG Debugger
Doppelganger: The Web's Evil Twin
Sharepoint 2007 Knowledge Network Exposed
Runtime Kernel Patching on Mac OS X
The Day of the Updates
Advanced SQL Injection
Hack like the Movie Stars: A Big-Screen Multi-Touch Network Monitor
Hack The Textbook
Wi-Fish Finder: Who Will Bite the Bait
Attacks Against 2wire Residential Gateways
Cracking the Poor and the Rich: Discovering the Relationship Between Physical and Network Security
AAPL- Automated Analog Telephone Logging
30k Feet Look at WiFi
USB Attacks: Fun with Plug & 0wn
De Gustibus, or Hacking your Tastebuds