1 |
 |
Showmecon 2014 - Protecting The Seams:Military Doctrine Applied To Application And Network Security Paul Vencill |
8 years, 10 months |
Securitytube_Poster |
|
3599 |
None |
2 |
 |
Showmecon 2014 - Start With The Bpt Then Worry About The Apt! Kevin Cardwel |
8 years, 10 months |
Securitytube_Poster |
|
3234 |
None |
3 |
 |
Showmecon 2014 - Cognitive Injection Andy Ellis |
8 years, 10 months |
Securitytube_Poster |
|
3212 |
None |
4 |
 |
Showmecon 2014 - Inside The World’S Most Dangerous Search Engine |
8 years, 10 months |
Securitytube_Poster |
|
3593 |
None |
5 |
 |
Showmecon 2014 - Hacking To Get Caught: A Concept For Adversary Replication And Penetration Testing |
8 years, 10 months |
Securitytube_Poster |
|
4132 |
None |
6 |
 |
Showmecon 2014 - Power-Ups And Princesses: What Video Games Taught Me About Building A Security Awareness Program |
8 years, 10 months |
Securitytube_Poster |
|
3258 |
None |
7 |
 |
Showmecon 2014 - Powershell And You: Using Microsoft’S Post-Exploitation Language |
8 years, 10 months |
Securitytube_Poster |
|
3168 |
None |
8 |
 |
Showmecon 2014 - Dropping Docs On Darknets: How People Got Caught |
8 years, 10 months |
Securitytube_Poster |
|
3168 |
None |
9 |
 |
Showmecon 2014 - The Call Of Community: Modern Warfare |
8 years, 10 months |
Securitytube_Poster |
|
2849 |
None |
10 |
 |
Showmecon 2014 - Physical (In)Security – It’S Not All About Cyber |
8 years, 10 months |
Securitytube_Poster |
|
2921 |
None |
11 |
 |
Showmecon 2014 - Bending And Twisting Networks |
8 years, 10 months |
Securitytube_Poster |
|
2925 |
None |
12 |
 |
Showmecon 2014 - Here, Let Me Hold That For You. Consumer Metadata And Its Dangers |
8 years, 10 months |
Securitytube_Poster |
|
3081 |
None |
13 |
 |
Troopers 14 - Implementing An Usb Host Driver Fuzzer - Daniel Mende |
8 years, 10 months |
Securitytube_Poster |
|
3409 |
None |
14 |
 |
Troopers 14 - 20 Ways Past Secure Boot - Job De Haas |
8 years, 10 months |
Securitytube_Poster |
|
3869 |
None |
15 |
 |
Troopers 14 - Georg Bakos - Keynote |
8 years, 10 months |
Securitytube_Poster |
|
2809 |
None |
16 |
 |
Troopers 14 - Why Ipv6 Security Is So Hard - Enno Rey |
8 years, 10 months |
Securitytube_Poster |
|
3200 |
None |
17 |
 |
Troopers 14 - Get Over It: Privacy Is Good For Security - Rob Lee |
8 years, 10 months |
Securitytube_Poster |
|
3028 |
None |
18 |
 |
Troopers14 - How To Work Towards Pharma Compliance For Cloud Computing - Martijn Jansen |
8 years, 10 months |
Securitytube_Poster |
|
3276 |
None |
19 |
 |
Troopers 14 - Psychology Of Security - Stefan Schumacher |
8 years, 10 months |
Securitytube_Poster |
|
3292 |
None |
20 |
 |
Troopers 14 - Bro: A Flexible Open-Source Platform - Robin Summer |
8 years, 10 months |
Securitytube_Poster |
|
3157 |
None |
21 |
 |
Troopers14 - Anti-Forensics On Sap Systems - Juan Perez-Etchegoyen &Amp; Will Vandevanter |
8 years, 10 months |
Securitytube_Poster |
|
3038 |
None |
22 |
 |
Troopers14 - Granular Trust; Making It Work - Toby Kohlenberg |
8 years, 10 months |
Securitytube_Poster |
|
2910 |
None |
23 |
 |
Troopers 14 - How I Latch On Me And Protect My Digital Life Against Passwords - Chema Alonso |
8 years, 10 months |
Securitytube_Poster |
|
3473 |
None |
24 |
 |
Troopers 14 - Sap Businessobjects Attacks - Juan Perez-Etchegoyen &Amp; Will Vandevanter |
8 years, 10 months |
Securitytube_Poster |
|
3201 |
None |
25 |
 |
Troopers14 - Compromise-As-A-Service: Our Pleazure - Matthias Luft &Amp; Felix Wilhelm) |
8 years, 10 months |
Securitytube_Poster |
|
3236 |
None |
26 |
 |
Troopers14 - Risks In Hosted Sap Environments - Andreas Wiegenstein &Amp; Xu Jia |
8 years, 10 months |
Securitytube_Poster |
|
3581 |
None |
27 |
 |
Crypto 2013 - On The Indifferentiability Of Key-Alternating Ciphers |
8 years, 10 months |
Securitytube_Poster |
|
2883 |
None |
28 |
 |
Crypto 2013 - How To Run Turing Machines On Encrypted Data |
8 years, 10 months |
Securitytube_Poster |
|
2910 |
None |
29 |
 |
Crypto 2013 - Learning With Rounding, Revisited - New Reduction, Prope ... |
8 years, 10 months |
Securitytube_Poster |
|
2829 |
None |
30 |
 |
Troopers 14 - Injecting Evil Code In Your Sap J2ee Systems - Alexander Polyakov &Amp; Dimitry Chastuhin |
8 years, 10 months |
Securitytube_Poster |
|
3401 |
None |
31 |
 |
Troopers 14 - Sap's Network Protocols Revisited - Martin Gallo |
8 years, 10 months |
Securitytube_Poster |
|
3119 |
None |
32 |
 |
Troopers 14 - Osmosis - Christian Sielaff &Amp; Daniel Hauenstein |
8 years, 10 months |
Securitytube_Poster |
|
3317 |
None |
33 |
 |
Troopers 14 - Security And Sdn -- A Perfect Fit Or Oil-And-Water? - Ivan Pepelnjak |
8 years, 10 months |
Securitytube_Poster |
|
3143 |
None |
34 |
 |
Troopers 14 - What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek &Amp; Joseph Moti |
8 years, 10 months |
Securitytube_Poster |
|
2925 |
None |
35 |
 |
Troopers 14 - Easy Ways To Bypass Anti-Virus Systems - Attila Marosi |
8 years, 10 months |
Securitytube_Poster |
|
3844 |
None |
36 |
 |
Troopers 14 - The Three Billion Dollar App - Vladimir Wolstencroft |
8 years, 10 months |
Securitytube_Poster |
|
3006 |
None |
37 |
 |
Troopers 14 - Closing Remarks - Enno Rey |
8 years, 10 months |
Securitytube_Poster |
|
2925 |
None |
38 |
 |
Troopers 14 - Making (And Breaking) An 802.15.4 Wids - Sergey Bratus, Javier Vazquez, Ryan Speers |
8 years, 10 months |
Securitytube_Poster |
|
3347 |
None |
39 |
 |
Troopers 14 - Modern Smartphone Forensics - Vladimir Katalov |
8 years, 10 months |
Securitytube_Poster |
|
3191 |
None |
40 |
 |
Troopers 14 - Vulnerability Classification In The Saas Era - Noam Liran |
8 years, 10 months |
Securitytube_Poster |
|
2974 |
None |
41 |
 |
Challenge 6: Digest Authentication Reloaded |
8 years, 10 months |
Securitytube_Poster |
|
2786 |
None |
42 |
 |
Crypto 2013 - Practical Multilinear Maps Over The Integers |
8 years, 10 months |
Securitytube_Poster |
|
2974 |
None |
43 |
 |
Crypto 2013 - Sieve-In-The-Middle: Improved Mitm Attacks |
8 years, 10 months |
Securitytube_Poster |
|
3071 |
None |
44 |
 |
Crypto 2013 - Plain Versus Randomized Cascading-Based Key-Length Extension For Block Ciphers |
8 years, 10 months |
Securitytube_Poster |
|
3099 |
None |
45 |
 |
Troopers 14 - Keynote - Fx |
8 years, 10 months |
Securitytube_Poster |
|
2781 |
None |
46 |
 |
Crypto 2013 - Secure Signatures And Chosen Ciphertext Security In A Quantum Computing World |
8 years, 10 months |
Securitytube_Poster |
|
2899 |
None |
47 |
 |
Bsides Nashville 2014 - Welocome To Bsides Nashville |
8 years, 10 months |
Securitytube_Poster |
|
2936 |
None |
48 |
 |
Bsides Nashville 2014 - Jack Daniel (@Jack_Daniel): Bsides, Harmonicas, And Communication Skills |
8 years, 10 months |
Securitytube_Poster |
|
3578 |
None |
49 |
 |
Challenge 7: Cracking Digest Authentication |
8 years, 10 months |
Securitytube_Poster |
|
4384 |
None |
50 |
 |
Crypto 2013 - Quantum One-Time Programs - (Extended Abstract) |
8 years, 10 months |
Securitytube_Poster |
|
2581 |
None |
51 |
 |
Crypto 2013 - Practical Bootstrapping In Quasilinear Time |
8 years, 10 months |
Securitytube_Poster |
|
2759 |
None |
52 |
 |
Crypto 2013 - Fast Cut-And-Choose Based Protocols For Malicious And Covert Adversaries |
8 years, 10 months |
Securitytube_Poster |
|
2577 |
None |
53 |
 |
Troopers14 - Medical Device Cyber Security: The First 164 Years - Kevin Fu |
8 years, 10 months |
Securitytube_Poster |
|
2565 |
None |
54 |
 |
Bsides Nashville 2014 - Eve Adams (@Hackerhuntress): Attack Paths: Breaking Into Infosec From It Or Other Totally Different Fields |
8 years, 10 months |
Securitytube_Poster |
|
3163 |
None |
55 |
 |
Bsides Nashville 2014 - Adam Len Compton (@Tatanus): Learn From Your Mistakes |
8 years, 10 months |
Securitytube_Poster |
|
2252 |
None |
56 |
 |
Bsides Nashville 2014 - Scott Thomas (@Secureholio): Beating The Infosec Learning Curve Without Burning Out |
8 years, 10 months |
Securitytube_Poster |
|
2438 |
None |
57 |
 |
Challenge 8: Broken Authentication |
8 years, 10 months |
Securitytube_Poster |
|
2832 |
None |
58 |
 |
Bsides Nashville 2014 - Branden Miller (@Cowboysfaninky): Sun Tzu Was A Punk! Confucius Was An Infosec Rockstar! |
8 years, 10 months |
Securitytube_Poster |
|
2399 |
None |
59 |
 |
Bsides Nashville 2014 - Russell Butturini (@Tcstoolhax0r): Making Mongo Cry: Automated Nosql Exploitation With Nosqlmap |
8 years, 10 months |
Securitytube_Poster |
|
2462 |
None |
60 |
 |
Bsides Nashville 2014 - Matt Smith: Buy Viagra! |
8 years, 10 months |
Securitytube_Poster |
|
2315 |
None |
61 |
 |
Bsides Nashville 2014 - Stewart Fey: How Do I Hack Thee? Let Me Count The Ways |
8 years, 10 months |
Securitytube_Poster |
|
2283 |
None |
62 |
 |
Bsides Nashville 2014 - Adam John (@Ajohn76): Healthcare Security, Which Protocal? |
8 years, 10 months |
Securitytube_Poster |
|
2088 |
None |
63 |
 |
Bsides Nashville 2014 - Ben Miller (@Securithid): Why You Can't Prove You're Pwnd, But You Are! |
8 years, 10 months |
Securitytube_Poster |
|
2257 |
None |
64 |
 |
Bsides Nashville 2014 - Paul Coggin: (@Paulcoggin): Bending And Twisting Networks |
8 years, 10 months |
Securitytube_Poster |
|
2320 |
None |
65 |
 |
Challenge 9: Session Id Analysis |
8 years, 10 months |
Securitytube_Poster |
|
2490 |
None |
66 |
 |
Bsides Nashville 2014 - Rafal Los (@Wh1t3rabbit): Succeeding With Enterprise Software Security Key Performance Indicators |
8 years, 10 months |
Securitytube_Poster |
|
2105 |
None |
67 |
 |
Bsides Nashville 2014 - Kevin Riggs (@Adubiousdude): Scaling Security In The Enterprise: Making People A Stronger Link |
8 years, 10 months |
Securitytube_Poster |
|
2071 |
None |
68 |
 |
Bsides Nashville 2014 - Applying Analog Thinking To Digial Networks Winn Schwartu (@Winnschwartau) |
8 years, 10 months |
Securitytube_Poster |
|
2075 |
None |
69 |
 |
Bsides Nashville 2014 - Mark Kikta (@B31tf4c3): Seeing Purple: Hybrid Security Teams For The Enterprise |
8 years, 10 months |
Securitytube_Poster |
|
2153 |
None |
70 |
 |
Offensive Computer Security 2014 - Midterm #2 Review &Amp; Exploit Development |
8 years, 10 months |
Securitytube_Poster |
|
2328 |
None |
71 |
 |
Offensive Computer Security 2014 - Lecture 19 (Exploit Development 105) |
8 years, 10 months |
Securitytube_Poster |
|
2192 |
None |
72 |
 |
Offensive Computer Security 2014 - Hw7 Wireshark Video |
8 years, 10 months |
Securitytube_Poster |
|
2551 |
None |
73 |
 |
Challenge 10: Session Id Analysis Ii |
8 years, 10 months |
Securitytube_Poster |
|
1901 |
None |
74 |
 |
Offensive Computer Security 2014 - Lecture 22 (Metasploit) |
8 years, 10 months |
Securitytube_Poster |
|
2698 |
1 |
75 |
 |
Offensive Computer Security 2014 - Lecture 23 (Post Exploitation) |
8 years, 10 months |
Securitytube_Poster |
|
2508 |
None |
76 |
 |
Offensive Computer Security 2014 - Lecture 25 (Revisiting Old Topics) |
8 years, 10 months |
Securitytube_Poster |
|
2357 |
None |
77 |
 |
Offensive Computer Security 2014 - Lecture 26 Social Engineering |
8 years, 10 months |
Securitytube_Poster |
|
2469 |
None |
78 |
 |
Offensive Computer Security 2014 - Lecture 20 Return Oriented Programming (Hands On) |
8 years, 10 months |
Securitytube_Poster |
|
2743 |
None |
79 |
 |
Cerias - Women In Cyber Security |
8 years, 10 months |
Securitytube_Poster |
|
3285 |
None |
80 |
 |
Cerias - Beehive: Large-Scale Log Analysis For Detecting Suspicious Activity In Enterprise Networks |
8 years, 10 months |
Securitytube_Poster |
|
2723 |
None |
81 |
 |
Challenge 10: Session Id Analysis Ii |
8 years, 10 months |
Securitytube_Poster |
|
2319 |
None |
82 |
 |
Cerias - Secure And Private Outsourcing To Untrusted Cloud Servers |
8 years, 10 months |
Securitytube_Poster |
|
2212 |
None |
83 |
 |
Cerias - Technical Tradeoffs In The Nsa's Mass Phone Call Program |
8 years, 10 months |
Securitytube_Poster |
|
2192 |
None |
84 |
 |
Cerias - Why So Cerias!? Why We're Losing And What To Do About It. |
8 years, 10 months |
Securitytube_Poster |
|
2370 |
None |
85 |
 |
Cerias - Online Privacy Agreements, Is It Informed Consent? |
8 years, 10 months |
Securitytube_Poster |
|
2181 |
None |
86 |
 |
Cerias Info. Sec. Symposium 2014 - Awards - Purdue University |
8 years, 10 months |
Securitytube_Poster |
|
2135 |
None |
87 |
 |
Cerias - Integrity Levels: A New Paradigm For Protecting Computing Systems |
8 years, 10 months |
Securitytube_Poster |
|
2300 |
None |
88 |
 |
Cerias - Machine Intelligence For Biometric And On-Line Security |
8 years, 10 months |
Securitytube_Poster |
|
2231 |
None |
89 |
 |
Challenge 11: Session Id Analysis Iii |
8 years, 10 months |
Securitytube_Poster |
|
2024 |
None |
90 |
 |
Cerias - General-Purpose Secure Computation And Outsourcing |
8 years, 10 months |
Securitytube_Poster |
|
2424 |
None |
91 |
 |
Cerias - Differentially Private Publishing Of Geospatial Data |
8 years, 10 months |
Securitytube_Poster |
|
2190 |
None |
92 |
 |
Cerias - Whole Genome Sequencing: Innovation Dream Or Privacy Nightmare? |
8 years, 10 months |
Securitytube_Poster |
|
2587 |
None |
93 |
 |
Cerias - Minimizing Private Data Disclosures In The Smart Grid |
8 years, 10 months |
Securitytube_Poster |
|
2303 |
None |
94 |
 |
Cerias - Using Probabilistic Generative Models For Ranking Risks Of Android Apps |
8 years, 10 months |
Securitytube_Poster |
|
2339 |
None |
95 |
 |
Cerias - I'M Not Stealing, I'M Merely Borrowing - Plagiarism In Smartphone App Markets |
8 years, 10 months |
Securitytube_Poster |
|
2323 |
None |
96 |
 |
Challenge 12: Decrypting Ssl Traffic |
8 years, 10 months |
Securitytube_Poster |
|
2877 |
None |
97 |
 |
Cerias - A Semantic Baseline For Spam Filtering |
8 years, 10 months |
Securitytube_Poster |
|
2381 |
None |
98 |
 |
Cerias - Identity-Based Internet Protocol Network |
8 years, 10 months |
Securitytube_Poster |
|
2294 |
None |
99 |
 |
Cerias - Towards Automated Problem Inference From Trouble Tickets |
8 years, 10 months |
Securitytube_Poster |
|
2153 |
None |
100 |
 |
Cerias - Regulatory Compliance Software Engineering |
8 years, 10 months |
Securitytube_Poster |
|
2715 |
None |