![[ICO]](/indices/icons/blank.gif) | Name | Last modified | Size | Description |
![[PARENTDIR]](/indices/icons/back.png) | Parent Directory | | - | |
![[ ]](/indices/icons/pdf.png) | A Castle Made of Sand Adobe Reader X Sandbox - Richard Johnson, Sourcefire.pdf | 2011-12-22 15:33 | 755K | |
![[ ]](/indices/icons/text.png) | A Castle Made of Sand Adobe Reader X Sandbox - Richard Johnson, Sourcefire.pptx | 2011-12-22 15:33 | 933K | |
![[ ]](/indices/icons/text.png) | Black Box Auditing Adobe Shockwave - Aaron Portnoy, Logan Brown, Tipping Point H.P. Zero Day Initiative.pptx | 2011-12-22 15:34 | 3.9M | |
![[ ]](/indices/icons/pdf.png) | Borken Fonts The Story of Naive Parsers and Attacker Controlled Reboots - Marc Schönefeld, Red Hat.pdf | 2011-12-22 15:40 | 49M | |
![[ ]](/indices/icons/pdf.png) | Chip & PIN is Definitely Broken - Andrea Barisani and Daniele Bianco, Inversepath.pdf | 2011-12-22 15:31 | 2.0M | |
![[ ]](/indices/icons/pdf.png) | Deconstructing ColdFusion - Chris Eng & Brandon Creighton, Veracode.pdf | 2011-12-22 15:30 | 1.4M | |
![[ ]](/indices/icons/pdf.png) | Dymanic Cryptographic Trapdoors - Eric Filiol, ESIEA Laval CVO Lab & French DoD.pdf | 2011-12-22 15:30 | 1.2M | |
![[ ]](/indices/icons/ppt.png) | GRAPE Generative Rule-based Generic Stateful Fuzzing - Nicholas Green, FourteenForty.ppt | 2011-12-22 15:30 | 1.2M | |
![[ ]](/indices/icons/ppt.png) | iPhone and iPad Hacking - Ilja van Sprundel, IOActive.ppt | 2011-12-22 15:26 | 2.5M | |
![[ ]](/indices/icons/pdf.png) | Is Your Gaming Console Safe Embedded Devices, an AntiVirus-free Safe Hideout for Malware - DongJoo Ha and KiChan Ahn, AhnLab Inc and Korea Financial Telecommunications & Clearings Institute.pdf | 2011-12-22 15:30 | 2.0M | |
![[ ]](/indices/icons/text.png) | Network Application FW vs. Contemporary Threats (Brad Woodberg - Final).pptx | 2011-12-22 15:29 | 1.6M | |
![[ ]](/indices/icons/compressed.gif) | Project Ubertooth Building a Better Bluetooth Adapter - Michael Ossmann, Great Scott Gadgets.zip | 2011-12-22 15:33 | 23M | |
![[ ]](/indices/icons/pdf.png) | Runtime Firmware Integrity Verification What Can Now Be Achieved - Yves-Alexis Perez and Loic Duflot, ANSSI .pdf | 2011-12-22 15:29 | 288K | |
![[ ]](/indices/icons/text.png) | Security Defect Metrics for Targeted Fuzzing - Dustin Duran, Matt Miller, David Weston, Microsoft.pptx | 2011-12-22 15:28 | 700K | |
![[ ]](/indices/icons/text.png) | Showing How Security Has (And Hasn't) Improved, After Ten Years Of Trying -Dan Kaminski, Adam Cecchetti and Mike Eddington, Doxpara & Deja Vu Security.pptx | 2011-12-22 15:29 | 2.0M | |
![[ ]](/indices/icons/pdf.png) | SMS-o-Death From Analyzing To Attacking Mobile Phones on a Large Scale - Nico Golde and Collin Mulliner, TU-Berlin.pdf | 2011-12-22 15:29 | 6.5M | |
![[ ]](/indices/icons/pdf.png) | Stale Pointers Are The New Black - Vincenzo Iozzo and Giovanni Gola, Zynamics GmbH.pdf | 2011-12-22 15:28 | 2.4M | |
![[ ]](/indices/icons/pdf.png) | The Law of Web Application Hacking - Marcia Hofmann, EFF.pdf | 2011-12-22 15:27 | 247K | |
![[ ]](/indices/icons/pdf.png) | Understanding and Exploiting Flash ActionScript Vulnerabilities - Haifei Li, Fortinet.pdf | 2011-12-22 15:27 | 838K | |
![[ ]](/indices/icons/ppt.png) | Understanding and Exploiting Flash ActionScript Vulnerabilities - Haifei Li, Fortinet.ppt | 2011-12-22 15:27 | 1.4M | |
![[ ]](/icons/odf6odp-20x22.png) | Welcome to Rootkit Country - Graeme Neilson, Aura Software Security.odp | 2011-12-22 15:28 | 11M | |