Index of /blackhat/usa-2013/


../
US-13-Akhawe-Clickjacking-Revisited-A-Perceptua..> 31-Jul-2013 07:49             1621028
US-13-Allodi-HOW-CVSS-is-DOSsing-Your-Patching-..> 31-Jul-2013 07:50             7318741
US-13-Apa-Compromising-Industrial-Facilities-Fr..> 31-Jul-2013 07:51             4620441
US-13-Aumasson-Password-Hashing-the-Future-is-N..> 31-Jul-2013 15:10             4131568
US-13-Barisani-Fully-Arbitrary-802-3-Packet-Inj..> 31-Jul-2013 07:52              701011
US-13-Bathurst-Methodologies-for-Hacking-Embdde..> 31-Jul-2013 07:53             2565209
US-13-Bremer-Mo-Malware-Mo-Problems-Cuckoo-Sand..> 31-Jul-2013 07:53             1813025
US-13-Brodie-A-Practical-Attack-against-MDM-Sol..> 31-Jul-2013 07:53             2165710
US-13-Brown-RFID-Hacking-Live-Free-or-RFID-Hard..> 14-Aug-2013 18:06             4515576
US-13-Brown-RFID-Hacking-Live-Free-or-RFID-Hard..> 14-Aug-2013 18:06             9609083
US-13-Butterworth-BIOS-Security-Code.zip           14-Aug-2013 17:49             2685972
US-13-Butterworth-BIOS-Security-Slides.pdf         14-Aug-2013 17:49             5466505
US-13-Cesare-Bugalyze.com-Detecting-Bugs-Using-..> 31-Jul-2013 07:56             2489181
US-13-Chan-Smashing-The-Font-Scaler-Engine-in-W..> 31-Jul-2013 07:57             8535291
US-13-Chastuhin-With-BIGDATA-comes-BIG-responsi..> 31-Jul-2013 07:58             5192673
US-13-Clark-Legal-Aspects-of-Full-Spectrum-Comp..> 31-Jul-2013 07:58             1674458
US-13-Cole-OPSEC-Failures-of-Spies-Slides.pdf      31-Jul-2013 07:58             1381560
US-13-Crowley-Home-Invasion-2-0-Slides.pdf         31-Jul-2013 07:58             1184248
US-13-Crowley-HomeInvasion2-0-Source-Code.zip      31-Jul-2013 07:59             1132961
US-13-Daigniere-TLS-Secrets-Slides.pdf             31-Jul-2013 07:59              591804
US-13-Davis-Deriving-Intelligence-From-USB-Stac..> 31-Jul-2013 07:59             1657759
US-13-Duckwall-Pass-The-Hash-2-The-Admins-Reven..> 31-Jul-2013 07:59                7810
US-13-Duckwall-Pass-the-Hash-Slides.pdf            31-Jul-2013 07:59              848745
US-13-Dudley-Beyond-the-Application-Cellular-Pr..> 01-Aug-2013 11:18             2271755
US-13-Esparza-PDF-Attack-A-journey-from-the-Exp..> 31-Jul-2013 08:00              161695
US-13-Esparza-PDF-Attack-A-journey-from-the-Exp..> 20-Aug-2013 16:53             1291113
US-13-Espinhara-Using-Online-Activity-As-Digita..> 31-Jul-2013 08:00             2105432
US-13-Fiterman-Is-that-a-Government-in-Your-Net..> 31-Jul-2013 08:01             7207028
US-13-Forner-Out-of-Control-Demonstrating-SCADA..> 31-Jul-2013 08:01             2192638
US-13-Forristal-Android-One-Root-to-Own-Them-Al..> 31-Jul-2013 08:02             4167517
US-13-Geffner-End-To-End-Analysis-of-a-Domain-G..> 31-Jul-2013 08:03             6890263
US-13-Geffner-Tor...-All-The-Things-Slides.pdf     31-Jul-2013 08:04             4886120
US-13-Gorenc-Java-Every-Days-Exploiting-Softwar..> 31-Jul-2013 08:04             2917168
US-13-Grand-JTAGulator-Assisted-Discovery-of-On..> 31-Jul-2013 08:05             1156264
US-13-Grand-JTAGulator-Assisted-Discovery-of-On..> 31-Jul-2013 08:06            10296486
US-13-Hanif-Binarypig-Scalable-Malware-Analytic..> 31-Jul-2013 08:06             1244910
US-13-Hanif-Binarypig-Scalable-Malware-Analytic..> 19-Aug-2013 11:33             6345303
US-13-Haruyama-Malicous-File-For-Exploiting-For..> 31-Jul-2013 08:07             1479889
US-13-Healey-Above-My-Pay-Grade-Slides.pdf         31-Jul-2013 08:07             2298912
US-13-Heffner-Exploiting-Network-Surveillance-C..> 31-Jul-2013 08:10            23071525
US-13-Kohlenberg-UART-Thou-Mad-Slides.pdf          31-Jul-2013 08:11              490101
US-13-Lau-Mactans-Injecting-Malware-into-iOS-De..> 14-Aug-2013 17:42             3538832
US-13-Lee-Hacking-Surveilling-and-Deceiving-Vic..> 31-Jul-2013 08:11             1360780
US-13-Lee-Universal-DDoS-Mitigation-Bypass-Code..> 14-Aug-2013 17:44               41293
US-13-Lee-Universal-DDoS-Mitigation-Bypass-Slid..> 14-Aug-2013 17:44             4372605
US-13-Li-How-to-Grow-a-TREE-Code.zip               31-Jul-2013 08:12             3968677
US-13-Li-How-to-Grow-a-TREE-Slides.pdf             14-Aug-2013 17:41             4038845
US-13-Martin-Buying-Into-The-Bias-Why-Vulnerabi..> 12-Aug-2013 15:56             8233797
US-13-Masse-Denial-of-Service-as-a-Service-Slid..> 12-Aug-2013 15:50             5617237
US-13-McNamee-How-To-Build-a-SpyPhone-Slides.pdf   31-Jul-2013 08:29             3304318
US-13-Nakibly-Owning-the-Routing-Table-Part-II-..> 31-Jul-2013 08:29              559960
US-13-Nixon-Denying-Service-to-DDOS-Protection-..> 12-Aug-2013 12:08             3403109
US-13-OConnor-CreepyDOL-Cheap-Distributed-Stalk..> 12-Aug-2013 12:13             2330805
US-13-OFlynn-Power-Analysis-Attacks-for-Cheapsk..> 31-Jul-2013 08:32            14212868
US-13-Opi-Evading-Deep-Inspection-for-Fun-and-S..> 31-Jul-2013 08:33             2978717
US-13-Opi-Evading-Deep-Inspection-for-Fun-and-S..> 31-Jul-2013 08:33             2665762
US-13-Patnaik-Javascript-Static-Security-Analys..> 31-Jul-2013 08:33             1125149
US-13-Peck-Abusing-Web-APIs-Through-Scripted-An..> 31-Jul-2013 08:33              699360
US-13-Pinto-Defending-Networks-with-Incomplete-..> 14-Aug-2013 17:39             3977914
US-13-Polyakov-Practical-Pentesting-of-ERPs-and..> 31-Jul-2013 08:34             4835368
US-13-Prado-SSL-Gone-in-30-seconds-A-BREACH-bey..> 31-Jul-2013 08:35             2142444
US-13-Quynh-OptiROP-Hunting-for-ROP-Gadgets-in-..> 14-Aug-2013 18:02              919518
US-13-Raber-Virtual-Deobfuscator-A-DARPA-Cyber-..> 31-Jul-2013 08:35              164536
US-13-Raber-Virtual-Deobfuscator-A-DARPA-Cyber-..> 31-Jul-2013 08:35              912122
US-13-Reidy-Combating-the-Insider-Threat-At-The..> 31-Jul-2013 08:36             3085521
US-13-Salgado-SQLi-Optimization-and-Obfuscation..> 12-Aug-2013 15:47             1193832
US-13-Saxe-CrowdSource-An-Open-Source-Crowd-Tra..> 31-Jul-2013 08:36             2711366
US-13-Sevinsky-Funderbolt-Adventures-in-Thunder..> 14-Aug-2013 17:37            11161677
US-13-Singh-Hot-Knives-Through-Butter-Evading-F..> 12-Aug-2013 12:10             1350436
US-13-Smyth-Truncating-TLS-Connections-to-Viola..> 01-Aug-2013 15:54             1322990
US-13-Snow-Just-In-Time-Code-Reuse-Slides.pdf      14-Aug-2013 17:50             6885547
US-13-Soeder-Black-Box-Assessment-of-Pseudorand..> 31-Jul-2013 08:38               69465
US-13-Soeder-Black-Box-Assessment-of-Pseudorand..> 31-Jul-2013 08:39             1178423
US-13-Spill-Whats-on-the-Wire-Slides.pdf           31-Jul-2013 08:39             2555508
US-13-Stewart-Mobile-Malware-Why-the-Traditiona..> 31-Jul-2013 08:40             8200734
US-13-Sumner-Predicting-Susceptibility-to-Socia..> 31-Jul-2013 08:40             2335845
US-13-Temmingh-Maltego-Tungsten-as-a-Collaborat..> 31-Jul-2013 08:41             4830662
US-13-Vuksan-Press-ROOT-to-Continue-Detecting-M..> 31-Jul-2013 08:41             1482502
US-13-Wicherski-Hacking-like-in-the-Movies-Visu..> 31-Jul-2013 08:41              634464
US-13-Wicherski-Hacking-like-in-the-Movies-Visu..> 31-Jul-2013 08:42             1212506
US-13-Wilhoit-The-SCADA-That-Didnt-Cry-Wolf-Who..> 12-Aug-2013 15:46             2989600
US-13-Williams-Post-Exploitation-Operations-wit..> 31-Jul-2013 08:43             1957334
US-13-Wroblewski-The-Web-IS-Vulnerable-XSS-Defe..> 31-Jul-2013 08:45            12594237
US-13-Wroblewski-The-Web-IS-Vulnerable-XSS-Defe..> 31-Jul-2013 08:45             2954470
US-13-Xu-New-Trends-in-FastFlux-Networks-Slides..> 31-Jul-2013 08:45             1908038
US-13-Yarochkin-In-Depth-Analysis-of-Escalated-..> 29-Aug-2013 14:40            12566924
US-13-Young-Mainframes-The-Past-Will-Come-Back-..> 31-Jul-2013 08:48             8535720
US-13-Zaddach-Workshop-on-Embedded-Devices-Secu..> 31-Jul-2013 08:48             3305918
us-13-Alexander-keynote.pdf                        31-Jul-2013 12:35            16105242
us-13-Blanchou-Shattering-Illusions-in-Lock-Fre..> 01-Aug-2013 15:53             1175555
us-13-Bulygin-A-Tale-of-One-Software-Bypass-of-..> 09-Aug-2013 16:58             3189029
us-13-Grossman-Million-Browser-Botnet.pdf          12-Aug-2013 12:08            21683176
us-13-Jurczyk-Bochspwn-Identifying-0-days-via-S..> 14-Aug-2013 17:53             5522672
us-13-Nohl-Rooting-SIM-cards-Slides.pdf            14-Aug-2013 18:02             1902320
us-13-Ryan-Bluetooth-Smart-The-Good-The-Bad-The..> 09-Aug-2013 16:59              863388
us-13-Stamos-The-Factoring-Dead.pdf                14-Aug-2013 18:01             1199653