Index of /blackhat/usa-2013/
../
US-13-Akhawe-Clickjacking-Revisited-A-Perceptua..> 31-Jul-2013 07:49 1621028
US-13-Allodi-HOW-CVSS-is-DOSsing-Your-Patching-..> 31-Jul-2013 07:50 7318741
US-13-Apa-Compromising-Industrial-Facilities-Fr..> 31-Jul-2013 07:51 4620441
US-13-Aumasson-Password-Hashing-the-Future-is-N..> 31-Jul-2013 15:10 4131568
US-13-Barisani-Fully-Arbitrary-802-3-Packet-Inj..> 31-Jul-2013 07:52 701011
US-13-Bathurst-Methodologies-for-Hacking-Embdde..> 31-Jul-2013 07:53 2565209
US-13-Bremer-Mo-Malware-Mo-Problems-Cuckoo-Sand..> 31-Jul-2013 07:53 1813025
US-13-Brodie-A-Practical-Attack-against-MDM-Sol..> 31-Jul-2013 07:53 2165710
US-13-Brown-RFID-Hacking-Live-Free-or-RFID-Hard..> 14-Aug-2013 18:06 4515576
US-13-Brown-RFID-Hacking-Live-Free-or-RFID-Hard..> 14-Aug-2013 18:06 9609083
US-13-Butterworth-BIOS-Security-Code.zip 14-Aug-2013 17:49 2685972
US-13-Butterworth-BIOS-Security-Slides.pdf 14-Aug-2013 17:49 5466505
US-13-Cesare-Bugalyze.com-Detecting-Bugs-Using-..> 31-Jul-2013 07:56 2489181
US-13-Chan-Smashing-The-Font-Scaler-Engine-in-W..> 31-Jul-2013 07:57 8535291
US-13-Chastuhin-With-BIGDATA-comes-BIG-responsi..> 31-Jul-2013 07:58 5192673
US-13-Clark-Legal-Aspects-of-Full-Spectrum-Comp..> 31-Jul-2013 07:58 1674458
US-13-Cole-OPSEC-Failures-of-Spies-Slides.pdf 31-Jul-2013 07:58 1381560
US-13-Crowley-Home-Invasion-2-0-Slides.pdf 31-Jul-2013 07:58 1184248
US-13-Crowley-HomeInvasion2-0-Source-Code.zip 31-Jul-2013 07:59 1132961
US-13-Daigniere-TLS-Secrets-Slides.pdf 31-Jul-2013 07:59 591804
US-13-Davis-Deriving-Intelligence-From-USB-Stac..> 31-Jul-2013 07:59 1657759
US-13-Duckwall-Pass-The-Hash-2-The-Admins-Reven..> 31-Jul-2013 07:59 7810
US-13-Duckwall-Pass-the-Hash-Slides.pdf 31-Jul-2013 07:59 848745
US-13-Dudley-Beyond-the-Application-Cellular-Pr..> 01-Aug-2013 11:18 2271755
US-13-Esparza-PDF-Attack-A-journey-from-the-Exp..> 31-Jul-2013 08:00 161695
US-13-Esparza-PDF-Attack-A-journey-from-the-Exp..> 20-Aug-2013 16:53 1291113
US-13-Espinhara-Using-Online-Activity-As-Digita..> 31-Jul-2013 08:00 2105432
US-13-Fiterman-Is-that-a-Government-in-Your-Net..> 31-Jul-2013 08:01 7207028
US-13-Forner-Out-of-Control-Demonstrating-SCADA..> 31-Jul-2013 08:01 2192638
US-13-Forristal-Android-One-Root-to-Own-Them-Al..> 31-Jul-2013 08:02 4167517
US-13-Geffner-End-To-End-Analysis-of-a-Domain-G..> 31-Jul-2013 08:03 6890263
US-13-Geffner-Tor...-All-The-Things-Slides.pdf 31-Jul-2013 08:04 4886120
US-13-Gorenc-Java-Every-Days-Exploiting-Softwar..> 31-Jul-2013 08:04 2917168
US-13-Grand-JTAGulator-Assisted-Discovery-of-On..> 31-Jul-2013 08:05 1156264
US-13-Grand-JTAGulator-Assisted-Discovery-of-On..> 31-Jul-2013 08:06 10296486
US-13-Hanif-Binarypig-Scalable-Malware-Analytic..> 31-Jul-2013 08:06 1244910
US-13-Hanif-Binarypig-Scalable-Malware-Analytic..> 19-Aug-2013 11:33 6345303
US-13-Haruyama-Malicous-File-For-Exploiting-For..> 31-Jul-2013 08:07 1479889
US-13-Healey-Above-My-Pay-Grade-Slides.pdf 31-Jul-2013 08:07 2298912
US-13-Heffner-Exploiting-Network-Surveillance-C..> 31-Jul-2013 08:10 23071525
US-13-Kohlenberg-UART-Thou-Mad-Slides.pdf 31-Jul-2013 08:11 490101
US-13-Lau-Mactans-Injecting-Malware-into-iOS-De..> 14-Aug-2013 17:42 3538832
US-13-Lee-Hacking-Surveilling-and-Deceiving-Vic..> 31-Jul-2013 08:11 1360780
US-13-Lee-Universal-DDoS-Mitigation-Bypass-Code..> 14-Aug-2013 17:44 41293
US-13-Lee-Universal-DDoS-Mitigation-Bypass-Slid..> 14-Aug-2013 17:44 4372605
US-13-Li-How-to-Grow-a-TREE-Code.zip 31-Jul-2013 08:12 3968677
US-13-Li-How-to-Grow-a-TREE-Slides.pdf 14-Aug-2013 17:41 4038845
US-13-Martin-Buying-Into-The-Bias-Why-Vulnerabi..> 12-Aug-2013 15:56 8233797
US-13-Masse-Denial-of-Service-as-a-Service-Slid..> 12-Aug-2013 15:50 5617237
US-13-McNamee-How-To-Build-a-SpyPhone-Slides.pdf 31-Jul-2013 08:29 3304318
US-13-Nakibly-Owning-the-Routing-Table-Part-II-..> 31-Jul-2013 08:29 559960
US-13-Nixon-Denying-Service-to-DDOS-Protection-..> 12-Aug-2013 12:08 3403109
US-13-OConnor-CreepyDOL-Cheap-Distributed-Stalk..> 12-Aug-2013 12:13 2330805
US-13-OFlynn-Power-Analysis-Attacks-for-Cheapsk..> 31-Jul-2013 08:32 14212868
US-13-Opi-Evading-Deep-Inspection-for-Fun-and-S..> 31-Jul-2013 08:33 2978717
US-13-Opi-Evading-Deep-Inspection-for-Fun-and-S..> 31-Jul-2013 08:33 2665762
US-13-Patnaik-Javascript-Static-Security-Analys..> 31-Jul-2013 08:33 1125149
US-13-Peck-Abusing-Web-APIs-Through-Scripted-An..> 31-Jul-2013 08:33 699360
US-13-Pinto-Defending-Networks-with-Incomplete-..> 14-Aug-2013 17:39 3977914
US-13-Polyakov-Practical-Pentesting-of-ERPs-and..> 31-Jul-2013 08:34 4835368
US-13-Prado-SSL-Gone-in-30-seconds-A-BREACH-bey..> 31-Jul-2013 08:35 2142444
US-13-Quynh-OptiROP-Hunting-for-ROP-Gadgets-in-..> 14-Aug-2013 18:02 919518
US-13-Raber-Virtual-Deobfuscator-A-DARPA-Cyber-..> 31-Jul-2013 08:35 164536
US-13-Raber-Virtual-Deobfuscator-A-DARPA-Cyber-..> 31-Jul-2013 08:35 912122
US-13-Reidy-Combating-the-Insider-Threat-At-The..> 31-Jul-2013 08:36 3085521
US-13-Salgado-SQLi-Optimization-and-Obfuscation..> 12-Aug-2013 15:47 1193832
US-13-Saxe-CrowdSource-An-Open-Source-Crowd-Tra..> 31-Jul-2013 08:36 2711366
US-13-Sevinsky-Funderbolt-Adventures-in-Thunder..> 14-Aug-2013 17:37 11161677
US-13-Singh-Hot-Knives-Through-Butter-Evading-F..> 12-Aug-2013 12:10 1350436
US-13-Smyth-Truncating-TLS-Connections-to-Viola..> 01-Aug-2013 15:54 1322990
US-13-Snow-Just-In-Time-Code-Reuse-Slides.pdf 14-Aug-2013 17:50 6885547
US-13-Soeder-Black-Box-Assessment-of-Pseudorand..> 31-Jul-2013 08:38 69465
US-13-Soeder-Black-Box-Assessment-of-Pseudorand..> 31-Jul-2013 08:39 1178423
US-13-Spill-Whats-on-the-Wire-Slides.pdf 31-Jul-2013 08:39 2555508
US-13-Stewart-Mobile-Malware-Why-the-Traditiona..> 31-Jul-2013 08:40 8200734
US-13-Sumner-Predicting-Susceptibility-to-Socia..> 31-Jul-2013 08:40 2335845
US-13-Temmingh-Maltego-Tungsten-as-a-Collaborat..> 31-Jul-2013 08:41 4830662
US-13-Vuksan-Press-ROOT-to-Continue-Detecting-M..> 31-Jul-2013 08:41 1482502
US-13-Wicherski-Hacking-like-in-the-Movies-Visu..> 31-Jul-2013 08:41 634464
US-13-Wicherski-Hacking-like-in-the-Movies-Visu..> 31-Jul-2013 08:42 1212506
US-13-Wilhoit-The-SCADA-That-Didnt-Cry-Wolf-Who..> 12-Aug-2013 15:46 2989600
US-13-Williams-Post-Exploitation-Operations-wit..> 31-Jul-2013 08:43 1957334
US-13-Wroblewski-The-Web-IS-Vulnerable-XSS-Defe..> 31-Jul-2013 08:45 12594237
US-13-Wroblewski-The-Web-IS-Vulnerable-XSS-Defe..> 31-Jul-2013 08:45 2954470
US-13-Xu-New-Trends-in-FastFlux-Networks-Slides..> 31-Jul-2013 08:45 1908038
US-13-Yarochkin-In-Depth-Analysis-of-Escalated-..> 29-Aug-2013 14:40 12566924
US-13-Young-Mainframes-The-Past-Will-Come-Back-..> 31-Jul-2013 08:48 8535720
US-13-Zaddach-Workshop-on-Embedded-Devices-Secu..> 31-Jul-2013 08:48 3305918
us-13-Alexander-keynote.pdf 31-Jul-2013 12:35 16105242
us-13-Blanchou-Shattering-Illusions-in-Lock-Fre..> 01-Aug-2013 15:53 1175555
us-13-Bulygin-A-Tale-of-One-Software-Bypass-of-..> 09-Aug-2013 16:58 3189029
us-13-Grossman-Million-Browser-Botnet.pdf 12-Aug-2013 12:08 21683176
us-13-Jurczyk-Bochspwn-Identifying-0-days-via-S..> 14-Aug-2013 17:53 5522672
us-13-Nohl-Rooting-SIM-cards-Slides.pdf 14-Aug-2013 18:02 1902320
us-13-Ryan-Bluetooth-Smart-The-Good-The-Bad-The..> 09-Aug-2013 16:59 863388
us-13-Stamos-The-Factoring-Dead.pdf 14-Aug-2013 18:01 1199653