Catching DNS Tunnels with AI - A Talk About Artificial Intelligence, Geometry and Malicious Traffic
 
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Binary Obfuscation from the Top-Down: Obfuscating Executables Without Writing Assembly
Cross Site Scripting Anonymous Browser 2.0
 
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Cloud Security in Map/Reduce
Socially Owned in the Cloud
 
                        
                        
                        
                    
                    Deblaze - A Remote Method Enumeration Tool for Flex Servers
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Attacking SMS. It's No Longer Your BFF
 
                        
                        
                        
                    
                    Advanced MySQL Exploitation
 
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Proxy Prank-o-Matic
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Session Donation
Stealing Profits from Stock Market Spammers or: How I learned to Stop Worrying and Love the Spam
Automated Malware Similarity Analysis
 
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Injecting Electromagnetic Pulses into Digital Devices
Hacking UFOlogy 102: The Implications of UFOs for Life, the Universe, and Everything
Old Skool Brought Back: A 1964 Modem Demo
 
                        
                        
                        
                    
                    Air Traffic Control: Insecurity and ADS-B
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Packing and the Friendly Skies
Design and Implementation of a Quantum True Random Number Generator
Unfair Use - Speculations on the Future of Piracy
Smashing the Stack with Hydra: The Many Heads of Advanced Polymorphic Shellcode
 
                        
                        
                        
                    
                    Hardware Trojans: Infiltrating the Faraday Cage
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                    The Making of the second SQL injection Worm
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Hacking the Smart Grid
Manipulation and Abuse of the Consumer Credit Reporting Agencies
An Open JTAG Debugger
 
                        
                        
                    
                    Doppelganger: The Web's Evil Twin
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Sharepoint 2007 Knowledge Network Exposed
 
                        
                        
                        
                    
                    Runtime Kernel Patching on Mac OS X
 
                        
                        
                        
                    
                    The Day of the Updates
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Advanced SQL Injection
 
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Hack like the Movie Stars: A Big-Screen Multi-Touch Network Monitor
 
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Hack The Textbook
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Wi-Fish Finder: Who Will Bite the Bait
 
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Attacks Against 2wire Residential Gateways
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                    Cracking the Poor and the Rich: Discovering the Relationship Between Physical and Network Security
AAPL- Automated Analog Telephone Logging
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    30k Feet Look at WiFi
USB Attacks: Fun with Plug & 0wn
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                    De Gustibus, or Hacking your Tastebuds
