1 |
 |
Showmecon 2014 - Protecting The Seams:Military Doctrine Applied To Application And Network Security Paul Vencill |
9 years, 4 months |
Securitytube_Poster |
|
3862 |
None |
2 |
 |
Showmecon 2014 - Start With The Bpt Then Worry About The Apt! Kevin Cardwel |
9 years, 4 months |
Securitytube_Poster |
|
3425 |
None |
3 |
 |
Showmecon 2014 - Cognitive Injection Andy Ellis |
9 years, 4 months |
Securitytube_Poster |
|
3387 |
None |
4 |
 |
Showmecon 2014 - Inside The World’S Most Dangerous Search Engine |
9 years, 4 months |
Securitytube_Poster |
|
3792 |
None |
5 |
 |
Showmecon 2014 - Hacking To Get Caught: A Concept For Adversary Replication And Penetration Testing |
9 years, 4 months |
Securitytube_Poster |
|
4319 |
None |
6 |
 |
Showmecon 2014 - Power-Ups And Princesses: What Video Games Taught Me About Building A Security Awareness Program |
9 years, 4 months |
Securitytube_Poster |
|
3552 |
None |
7 |
 |
Showmecon 2014 - Powershell And You: Using Microsoft’S Post-Exploitation Language |
9 years, 4 months |
Securitytube_Poster |
|
3351 |
None |
8 |
 |
Showmecon 2014 - Dropping Docs On Darknets: How People Got Caught |
9 years, 4 months |
Securitytube_Poster |
|
3355 |
None |
9 |
 |
Showmecon 2014 - The Call Of Community: Modern Warfare |
9 years, 4 months |
Securitytube_Poster |
|
3039 |
None |
10 |
 |
Showmecon 2014 - Physical (In)Security – It’S Not All About Cyber |
9 years, 4 months |
Securitytube_Poster |
|
3169 |
None |
11 |
 |
Showmecon 2014 - Bending And Twisting Networks |
9 years, 4 months |
Securitytube_Poster |
|
3108 |
None |
12 |
 |
Showmecon 2014 - Here, Let Me Hold That For You. Consumer Metadata And Its Dangers |
9 years, 4 months |
Securitytube_Poster |
|
3258 |
None |
13 |
 |
Troopers 14 - Implementing An Usb Host Driver Fuzzer - Daniel Mende |
9 years, 4 months |
Securitytube_Poster |
|
3606 |
None |
14 |
 |
Troopers 14 - 20 Ways Past Secure Boot - Job De Haas |
9 years, 4 months |
Securitytube_Poster |
|
4077 |
None |
15 |
 |
Troopers 14 - Georg Bakos - Keynote |
9 years, 4 months |
Securitytube_Poster |
|
2996 |
None |
16 |
 |
Troopers 14 - Why Ipv6 Security Is So Hard - Enno Rey |
9 years, 4 months |
Securitytube_Poster |
|
3396 |
None |
17 |
 |
Troopers 14 - Get Over It: Privacy Is Good For Security - Rob Lee |
9 years, 4 months |
Securitytube_Poster |
|
3218 |
None |
18 |
 |
Troopers14 - How To Work Towards Pharma Compliance For Cloud Computing - Martijn Jansen |
9 years, 4 months |
Securitytube_Poster |
|
3455 |
None |
19 |
 |
Troopers 14 - Psychology Of Security - Stefan Schumacher |
9 years, 4 months |
Securitytube_Poster |
|
3482 |
None |
20 |
 |
Troopers 14 - Bro: A Flexible Open-Source Platform - Robin Summer |
9 years, 4 months |
Securitytube_Poster |
|
3346 |
None |
21 |
 |
Troopers14 - Anti-Forensics On Sap Systems - Juan Perez-Etchegoyen &Amp; Will Vandevanter |
9 years, 4 months |
Securitytube_Poster |
|
3215 |
None |
22 |
 |
Troopers14 - Granular Trust; Making It Work - Toby Kohlenberg |
9 years, 4 months |
Securitytube_Poster |
|
3102 |
None |
23 |
 |
Troopers 14 - How I Latch On Me And Protect My Digital Life Against Passwords - Chema Alonso |
9 years, 4 months |
Securitytube_Poster |
|
3659 |
None |
24 |
 |
Troopers 14 - Sap Businessobjects Attacks - Juan Perez-Etchegoyen &Amp; Will Vandevanter |
9 years, 4 months |
Securitytube_Poster |
|
3385 |
None |
25 |
 |
Troopers14 - Compromise-As-A-Service: Our Pleazure - Matthias Luft &Amp; Felix Wilhelm) |
9 years, 4 months |
Securitytube_Poster |
|
3410 |
None |
26 |
 |
Troopers14 - Risks In Hosted Sap Environments - Andreas Wiegenstein &Amp; Xu Jia |
9 years, 4 months |
Securitytube_Poster |
|
3765 |
None |
27 |
 |
Crypto 2013 - On The Indifferentiability Of Key-Alternating Ciphers |
9 years, 4 months |
Securitytube_Poster |
|
3092 |
None |
28 |
 |
Crypto 2013 - How To Run Turing Machines On Encrypted Data |
9 years, 4 months |
Securitytube_Poster |
|
3113 |
None |
29 |
 |
Crypto 2013 - Learning With Rounding, Revisited - New Reduction, Prope ... |
9 years, 4 months |
Securitytube_Poster |
|
3004 |
None |
30 |
 |
Troopers 14 - Injecting Evil Code In Your Sap J2ee Systems - Alexander Polyakov &Amp; Dimitry Chastuhin |
9 years, 4 months |
Securitytube_Poster |
|
3596 |
None |
31 |
 |
Troopers 14 - Sap's Network Protocols Revisited - Martin Gallo |
9 years, 4 months |
Securitytube_Poster |
|
3316 |
None |
32 |
 |
Troopers 14 - Osmosis - Christian Sielaff &Amp; Daniel Hauenstein |
9 years, 4 months |
Securitytube_Poster |
|
3518 |
None |
33 |
 |
Troopers 14 - Security And Sdn -- A Perfect Fit Or Oil-And-Water? - Ivan Pepelnjak |
9 years, 4 months |
Securitytube_Poster |
|
3335 |
None |
34 |
 |
Troopers 14 - What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek &Amp; Joseph Moti |
9 years, 4 months |
Securitytube_Poster |
|
3104 |
None |
35 |
 |
Troopers 14 - Easy Ways To Bypass Anti-Virus Systems - Attila Marosi |
9 years, 4 months |
Securitytube_Poster |
|
4051 |
None |
36 |
 |
Troopers 14 - The Three Billion Dollar App - Vladimir Wolstencroft |
9 years, 4 months |
Securitytube_Poster |
|
3184 |
None |
37 |
 |
Troopers 14 - Closing Remarks - Enno Rey |
9 years, 4 months |
Securitytube_Poster |
|
3110 |
None |
38 |
 |
Troopers 14 - Making (And Breaking) An 802.15.4 Wids - Sergey Bratus, Javier Vazquez, Ryan Speers |
9 years, 4 months |
Securitytube_Poster |
|
3549 |
None |
39 |
 |
Troopers 14 - Modern Smartphone Forensics - Vladimir Katalov |
9 years, 4 months |
Securitytube_Poster |
|
3371 |
None |
40 |
 |
Troopers 14 - Vulnerability Classification In The Saas Era - Noam Liran |
9 years, 4 months |
Securitytube_Poster |
|
3152 |
None |
41 |
 |
Challenge 6: Digest Authentication Reloaded |
9 years, 4 months |
Securitytube_Poster |
|
2974 |
None |
42 |
 |
Crypto 2013 - Practical Multilinear Maps Over The Integers |
9 years, 4 months |
Securitytube_Poster |
|
3167 |
None |
43 |
 |
Crypto 2013 - Sieve-In-The-Middle: Improved Mitm Attacks |
9 years, 4 months |
Securitytube_Poster |
|
3248 |
None |
44 |
 |
Crypto 2013 - Plain Versus Randomized Cascading-Based Key-Length Extension For Block Ciphers |
9 years, 4 months |
Securitytube_Poster |
|
3296 |
None |
45 |
 |
Troopers 14 - Keynote - Fx |
9 years, 4 months |
Securitytube_Poster |
|
2955 |
None |
46 |
 |
Crypto 2013 - Secure Signatures And Chosen Ciphertext Security In A Quantum Computing World |
9 years, 4 months |
Securitytube_Poster |
|
3094 |
None |
47 |
 |
Bsides Nashville 2014 - Welocome To Bsides Nashville |
9 years, 4 months |
Securitytube_Poster |
|
3123 |
None |
48 |
 |
Bsides Nashville 2014 - Jack Daniel (@Jack_Daniel): Bsides, Harmonicas, And Communication Skills |
9 years, 4 months |
Securitytube_Poster |
|
3758 |
None |
49 |
 |
Challenge 7: Cracking Digest Authentication |
9 years, 4 months |
Securitytube_Poster |
|
4587 |
None |
50 |
 |
Crypto 2013 - Quantum One-Time Programs - (Extended Abstract) |
9 years, 4 months |
Securitytube_Poster |
|
2750 |
None |
51 |
 |
Crypto 2013 - Practical Bootstrapping In Quasilinear Time |
9 years, 4 months |
Securitytube_Poster |
|
2937 |
None |
52 |
 |
Crypto 2013 - Fast Cut-And-Choose Based Protocols For Malicious And Covert Adversaries |
9 years, 4 months |
Securitytube_Poster |
|
2768 |
None |
53 |
 |
Troopers14 - Medical Device Cyber Security: The First 164 Years - Kevin Fu |
9 years, 4 months |
Securitytube_Poster |
|
2703 |
None |
54 |
 |
Bsides Nashville 2014 - Eve Adams (@Hackerhuntress): Attack Paths: Breaking Into Infosec From It Or Other Totally Different Fields |
9 years, 4 months |
Securitytube_Poster |
|
3334 |
None |
55 |
 |
Bsides Nashville 2014 - Adam Len Compton (@Tatanus): Learn From Your Mistakes |
9 years, 4 months |
Securitytube_Poster |
|
2407 |
None |
56 |
 |
Bsides Nashville 2014 - Scott Thomas (@Secureholio): Beating The Infosec Learning Curve Without Burning Out |
9 years, 4 months |
Securitytube_Poster |
|
2575 |
None |
57 |
 |
Challenge 8: Broken Authentication |
9 years, 4 months |
Securitytube_Poster |
|
2968 |
None |
58 |
 |
Bsides Nashville 2014 - Branden Miller (@Cowboysfaninky): Sun Tzu Was A Punk! Confucius Was An Infosec Rockstar! |
9 years, 4 months |
Securitytube_Poster |
|
2531 |
None |
59 |
 |
Bsides Nashville 2014 - Russell Butturini (@Tcstoolhax0r): Making Mongo Cry: Automated Nosql Exploitation With Nosqlmap |
9 years, 4 months |
Securitytube_Poster |
|
2599 |
None |
60 |
 |
Bsides Nashville 2014 - Matt Smith: Buy Viagra! |
9 years, 4 months |
Securitytube_Poster |
|
2458 |
None |
61 |
 |
Bsides Nashville 2014 - Stewart Fey: How Do I Hack Thee? Let Me Count The Ways |
9 years, 4 months |
Securitytube_Poster |
|
2420 |
None |
62 |
 |
Bsides Nashville 2014 - Adam John (@Ajohn76): Healthcare Security, Which Protocal? |
9 years, 4 months |
Securitytube_Poster |
|
2221 |
None |
63 |
 |
Bsides Nashville 2014 - Ben Miller (@Securithid): Why You Can't Prove You're Pwnd, But You Are! |
9 years, 4 months |
Securitytube_Poster |
|
2389 |
None |
64 |
 |
Bsides Nashville 2014 - Paul Coggin: (@Paulcoggin): Bending And Twisting Networks |
9 years, 4 months |
Securitytube_Poster |
|
2451 |
None |
65 |
 |
Challenge 9: Session Id Analysis |
9 years, 4 months |
Securitytube_Poster |
|
2626 |
None |
66 |
 |
Bsides Nashville 2014 - Rafal Los (@Wh1t3rabbit): Succeeding With Enterprise Software Security Key Performance Indicators |
9 years, 4 months |
Securitytube_Poster |
|
2236 |
None |
67 |
 |
Bsides Nashville 2014 - Kevin Riggs (@Adubiousdude): Scaling Security In The Enterprise: Making People A Stronger Link |
9 years, 4 months |
Securitytube_Poster |
|
2207 |
None |
68 |
 |
Bsides Nashville 2014 - Applying Analog Thinking To Digial Networks Winn Schwartu (@Winnschwartau) |
9 years, 4 months |
Securitytube_Poster |
|
2213 |
None |
69 |
 |
Bsides Nashville 2014 - Mark Kikta (@B31tf4c3): Seeing Purple: Hybrid Security Teams For The Enterprise |
9 years, 4 months |
Securitytube_Poster |
|
2308 |
None |
70 |
 |
Offensive Computer Security 2014 - Midterm #2 Review &Amp; Exploit Development |
9 years, 4 months |
Securitytube_Poster |
|
2497 |
None |
71 |
 |
Offensive Computer Security 2014 - Lecture 19 (Exploit Development 105) |
9 years, 4 months |
Securitytube_Poster |
|
2322 |
None |
72 |
 |
Offensive Computer Security 2014 - Hw7 Wireshark Video |
9 years, 4 months |
Securitytube_Poster |
|
2684 |
None |
73 |
 |
Challenge 10: Session Id Analysis Ii |
9 years, 4 months |
Securitytube_Poster |
|
2035 |
None |
74 |
 |
Offensive Computer Security 2014 - Lecture 22 (Metasploit) |
9 years, 4 months |
Securitytube_Poster |
|
2841 |
1 |
75 |
 |
Offensive Computer Security 2014 - Lecture 23 (Post Exploitation) |
9 years, 4 months |
Securitytube_Poster |
|
2639 |
None |
76 |
 |
Offensive Computer Security 2014 - Lecture 25 (Revisiting Old Topics) |
9 years, 4 months |
Securitytube_Poster |
|
2516 |
None |
77 |
 |
Offensive Computer Security 2014 - Lecture 26 Social Engineering |
9 years, 4 months |
Securitytube_Poster |
|
2613 |
None |
78 |
 |
Offensive Computer Security 2014 - Lecture 20 Return Oriented Programming (Hands On) |
9 years, 4 months |
Securitytube_Poster |
|
2876 |
None |
79 |
 |
Cerias - Women In Cyber Security |
9 years, 4 months |
Securitytube_Poster |
|
3415 |
None |
80 |
 |
Cerias - Beehive: Large-Scale Log Analysis For Detecting Suspicious Activity In Enterprise Networks |
9 years, 4 months |
Securitytube_Poster |
|
2853 |
None |
81 |
 |
Challenge 10: Session Id Analysis Ii |
9 years, 4 months |
Securitytube_Poster |
|
2450 |
None |
82 |
 |
Cerias - Secure And Private Outsourcing To Untrusted Cloud Servers |
9 years, 4 months |
Securitytube_Poster |
|
2346 |
None |
83 |
 |
Cerias - Technical Tradeoffs In The Nsa's Mass Phone Call Program |
9 years, 4 months |
Securitytube_Poster |
|
2331 |
None |
84 |
 |
Cerias - Why So Cerias!? Why We're Losing And What To Do About It. |
9 years, 4 months |
Securitytube_Poster |
|
2497 |
None |
85 |
 |
Cerias - Online Privacy Agreements, Is It Informed Consent? |
9 years, 4 months |
Securitytube_Poster |
|
2315 |
None |
86 |
 |
Cerias Info. Sec. Symposium 2014 - Awards - Purdue University |
9 years, 4 months |
Securitytube_Poster |
|
2266 |
None |
87 |
 |
Cerias - Integrity Levels: A New Paradigm For Protecting Computing Systems |
9 years, 4 months |
Securitytube_Poster |
|
2430 |
None |
88 |
 |
Cerias - Machine Intelligence For Biometric And On-Line Security |
9 years, 4 months |
Securitytube_Poster |
|
2365 |
None |
89 |
 |
Challenge 11: Session Id Analysis Iii |
9 years, 4 months |
Securitytube_Poster |
|
2158 |
None |
90 |
 |
Cerias - General-Purpose Secure Computation And Outsourcing |
9 years, 4 months |
Securitytube_Poster |
|
2562 |
None |
91 |
 |
Cerias - Differentially Private Publishing Of Geospatial Data |
9 years, 4 months |
Securitytube_Poster |
|
2317 |
None |
92 |
 |
Cerias - Whole Genome Sequencing: Innovation Dream Or Privacy Nightmare? |
9 years, 4 months |
Securitytube_Poster |
|
2722 |
None |
93 |
 |
Cerias - Minimizing Private Data Disclosures In The Smart Grid |
9 years, 4 months |
Securitytube_Poster |
|
2441 |
None |
94 |
 |
Cerias - Using Probabilistic Generative Models For Ranking Risks Of Android Apps |
9 years, 4 months |
Securitytube_Poster |
|
2475 |
None |
95 |
 |
Cerias - I'M Not Stealing, I'M Merely Borrowing - Plagiarism In Smartphone App Markets |
9 years, 4 months |
Securitytube_Poster |
|
2450 |
None |
96 |
 |
Challenge 12: Decrypting Ssl Traffic |
9 years, 4 months |
Securitytube_Poster |
|
3008 |
None |
97 |
 |
Cerias - A Semantic Baseline For Spam Filtering |
9 years, 4 months |
Securitytube_Poster |
|
2523 |
None |
98 |
 |
Cerias - Identity-Based Internet Protocol Network |
9 years, 4 months |
Securitytube_Poster |
|
2438 |
None |
99 |
 |
Cerias - Towards Automated Problem Inference From Trouble Tickets |
9 years, 4 months |
Securitytube_Poster |
|
2286 |
None |
100 |
 |
Cerias - Regulatory Compliance Software Engineering |
9 years, 4 months |
Securitytube_Poster |
|
2879 |
None |