| Name | Last modified | Size | Description |
| Parent Directory | | - | |
| A Castle Made of Sand Adobe Reader X Sandbox - Richard Johnson, Sourcefire.pdf | 2011-12-22 15:33 | 755K | |
| A Castle Made of Sand Adobe Reader X Sandbox - Richard Johnson, Sourcefire.pptx | 2011-12-22 15:33 | 933K | |
| Black Box Auditing Adobe Shockwave - Aaron Portnoy, Logan Brown, Tipping Point H.P. Zero Day Initiative.pptx | 2011-12-22 15:34 | 3.9M | |
| Borken Fonts The Story of Naive Parsers and Attacker Controlled Reboots - Marc Schönefeld, Red Hat.pdf | 2011-12-22 15:40 | 49M | |
| Chip & PIN is Definitely Broken - Andrea Barisani and Daniele Bianco, Inversepath.pdf | 2011-12-22 15:31 | 2.0M | |
| Deconstructing ColdFusion - Chris Eng & Brandon Creighton, Veracode.pdf | 2011-12-22 15:30 | 1.4M | |
| Dymanic Cryptographic Trapdoors - Eric Filiol, ESIEA Laval CVO Lab & French DoD.pdf | 2011-12-22 15:30 | 1.2M | |
| GRAPE Generative Rule-based Generic Stateful Fuzzing - Nicholas Green, FourteenForty.ppt | 2011-12-22 15:30 | 1.2M | |
| iPhone and iPad Hacking - Ilja van Sprundel, IOActive.ppt | 2011-12-22 15:26 | 2.5M | |
| Is Your Gaming Console Safe Embedded Devices, an AntiVirus-free Safe Hideout for Malware - DongJoo Ha and KiChan Ahn, AhnLab Inc and Korea Financial Telecommunications & Clearings Institute.pdf | 2011-12-22 15:30 | 2.0M | |
| Network Application FW vs. Contemporary Threats (Brad Woodberg - Final).pptx | 2011-12-22 15:29 | 1.6M | |
| Project Ubertooth Building a Better Bluetooth Adapter - Michael Ossmann, Great Scott Gadgets.zip | 2011-12-22 15:33 | 23M | |
| Runtime Firmware Integrity Verification What Can Now Be Achieved - Yves-Alexis Perez and Loic Duflot, ANSSI .pdf | 2011-12-22 15:29 | 288K | |
| Security Defect Metrics for Targeted Fuzzing - Dustin Duran, Matt Miller, David Weston, Microsoft.pptx | 2011-12-22 15:28 | 700K | |
| Showing How Security Has (And Hasn't) Improved, After Ten Years Of Trying -Dan Kaminski, Adam Cecchetti and Mike Eddington, Doxpara & Deja Vu Security.pptx | 2011-12-22 15:29 | 2.0M | |
| SMS-o-Death From Analyzing To Attacking Mobile Phones on a Large Scale - Nico Golde and Collin Mulliner, TU-Berlin.pdf | 2011-12-22 15:29 | 6.5M | |
| Stale Pointers Are The New Black - Vincenzo Iozzo and Giovanni Gola, Zynamics GmbH.pdf | 2011-12-22 15:28 | 2.4M | |
| The Law of Web Application Hacking - Marcia Hofmann, EFF.pdf | 2011-12-22 15:27 | 247K | |
| Understanding and Exploiting Flash ActionScript Vulnerabilities - Haifei Li, Fortinet.pdf | 2011-12-22 15:27 | 838K | |
| Understanding and Exploiting Flash ActionScript Vulnerabilities - Haifei Li, Fortinet.ppt | 2011-12-22 15:27 | 1.4M | |
| Welcome to Rootkit Country - Graeme Neilson, Aura Software Security.odp | 2011-12-22 15:28 | 11M | |