- Presentations
- Documents
- Infographics
CSW2017 Enrico branca What if encrypted communications are not as secure as we think?
CanSecWest
•
7 years ago
Live Memory Forensics on Android devices
Nikos Gkogkos
•
8 years ago
Practice of Android Reverse Engineering
National Cheng Kung University
•
12 years ago
44CON London 2015 - How to drive a malware analyst crazy
44CON
•
8 years ago
Virus Bulletin 2015: Exposing Gatekeeper
Synack
•
8 years ago
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON
•
8 years ago
Shall We Play a Game?
sghctoma
•
8 years ago
200 Open Source Projects Later: Source Code Static Analysis Experience
Andrey Karpov
•
8 years ago
Fun with p and q
Ilia Levin
•
9 years ago
Course lecture - An introduction to the Return Oriented Programming
Jonathan Salwan
•
9 years ago
SyScan 2015 Bonus Slides - death of the vmsize=0 dyld trick
Stefan Esser
•
9 years ago
Ruxcon 2014 - Stefan Esser - iOS8 Containers, Sandboxes and Entitlements
Stefan Esser
•
9 years ago
44CON 2014 - Breaking AV Software
44CON
•
9 years ago
SyScan 2015 - iOS 678 Security - A Study in Fail
Stefan Esser
•
9 years ago
DEP/ASLR bypass without ROP/JIT
Artem I. Baranov
•
10 years ago
Persistent Bios Infection
guest042636
•
15 years ago