2012 USA : Scientific but Not Academical Overview of Malware Anti-Debugging, Anti-Disassembly and AntiVM Technologies
2012 USA : File Disinfection Framework (FDF) Striking back at polymorphic viruses
2012 USA : FLOWERS FOR AUTOMATED MALWARE ANALYSIS
2012 USA : HYBRID DEFENSE: HOW TO PROTECT YOURSELF FROM POLYMORPHIC 0-DAYS
2013 Europe : OPTISIG: SEMANTIC SIGNATURE FOR METAMORPHIC MALWARE
2012 EuropeThe Kelihos Botnet
2012 EuropeWorkshop: Understanding Botnets By Building One
2012 ABU DHABI : THE ENDLESS GAME, FIGHTING AGAINST KELIHOS BOTNET
2012 ABU DHABI : REVERSE AND SIMULATE YOUR ENEMY BOTNET C&C
2013年4月3日 星期三
Black Hat Conference : Other
Web Application
2012 USA : HACKING WITH WEBSOCKETS
2012 USA : HTML5 TOP 10 THREATS – STEALTH ATTACKS AND SILENT EXPLOITS
Reverse Engineering
2012 USA : LESSONS OF BINARY ANALYSIS
2012 USA : LINUX INTERACTIVE EXPLOIT DEVELOPMENT WITH GDB AND PEDA
2012 Europe : Entrapment: Tricking Malware with Transparent, Scalable Malware Analysis
Othera
2012 USA : OWNING BAD GUYS {AND MAFIA} WITH JAVASCRIPT BOTNETS
2012 USA : PRNG: PWNING RANDOM NUMBER GENERATORS (IN PHP APPLICATIONS)
2012 USA : STATE OF WEB EXPLOIT TOOLKITS
2013 Europe : HARNESSING GP2US - BUILDING BETTER BROWSER BASED BOTNETS
2013 Europe : ASSESSING BYOD WITH THE SMARTPHONE PENTEST FRAMEWORK
2012 ABU DHABI : THE ART OF CYBERWAR
2012 ABU DHABI : CYBERCRIME KILL CHAIN VS. EFFECTIVENESS OF DEFENSE LAYERS
Black Hat Conference : Exploit
There are some articles about exploit and vulnerability in Black Hat
2012 USA : A Stitch In Time Saves Nine: A Stitch In Time Saves Nine: A Case Of Multiple OS Vulnerability
2012 USA : DIGGING DEEP INTO THE FLASH SANDBOXES
2012 USA : EASY LOCAL WINDOWS KERNEL EXPLOITATION
2012 USA : A Stitch In Time Saves Nine: A Stitch In Time Saves Nine: A Case Of Multiple OS Vulnerability
2012 USA : DIGGING DEEP INTO THE FLASH SANDBOXES
2012 USA : EASY LOCAL WINDOWS KERNEL EXPLOITATION
2012 USA : EXPLOIT MITIGATION IMPROVEMENTS IN WIN 8
2012 USA : RECENT JAVA EXPLOITATION TRENDS AND MALWARE
2012 Europe : Malicious PDF Analysis
2012 Europe : Data Mining a Mountain of Zero Day Vulnerabilities
Black Hat Conference : Modile Device
There are some articles about mobile device in Black Hat
2012 USA : DEX EDUCATION: PRACTICING SAFE DEX
2012 USA : Adventures in BouncerLand
2012 USA : MAPPING AND EVOLUTION OF ANDROID PERMISSIONS
2013 Europe : NEXT GENERATION MOBILE ROOTKITS
2012 Europe : The Heavy Metal That Poisoned the Droid
2012 Europe : The Mobile Exploit Intelligence Projec
2012 ABU DHABI : DROID EXPLOITATION SAGA
訂閱:
文章 (Atom)