[ICO]NameLast modifiedSizeDescription
[PARENTDIR]Parent Directory  -  
[   ]A Castle Made of Sand Adobe Reader X Sandbox - Richard Johnson, Sourcefire.pdf2011-12-23 02:33 755K 
[   ]A Castle Made of Sand Adobe Reader X Sandbox - Richard Johnson, Sourcefire.pptx2011-12-23 02:33 933K 
[   ]Black Box Auditing Adobe Shockwave - Aaron Portnoy, Logan Brown, Tipping Point H.P. Zero Day Initiative.pptx2011-12-23 02:34 3.9M 
[   ]Borken Fonts The Story of Naive Parsers and Attacker Controlled Reboots - Marc Schönefeld, Red Hat.pdf2011-12-23 02:40 49M 
[   ]Chip & PIN is Definitely Broken - Andrea Barisani and Daniele Bianco, Inversepath.pdf2011-12-23 02:31 2.0M 
[   ]Deconstructing ColdFusion - Chris Eng & Brandon Creighton, Veracode.pdf2011-12-23 02:30 1.4M 
[   ]Dymanic Cryptographic Trapdoors - Eric Filiol, ESIEA Laval CVO Lab & French DoD.pdf2011-12-23 02:30 1.2M 
[   ]GRAPE Generative Rule-based Generic Stateful Fuzzing - Nicholas Green, FourteenForty.ppt2011-12-23 02:30 1.2M 
[   ]iPhone and iPad Hacking - Ilja van Sprundel, IOActive.ppt2011-12-23 02:26 2.5M 
[   ]Is Your Gaming Console Safe Embedded Devices, an AntiVirus-free Safe Hideout for Malware - DongJoo Ha and KiChan Ahn, AhnLab Inc and Korea Financial Telecommunications & Clearings Institute.pdf2011-12-23 02:30 2.0M 
[   ]Network Application FW vs. Contemporary Threats (Brad Woodberg - Final).pptx2011-12-23 02:29 1.6M 
[   ]Project Ubertooth Building a Better Bluetooth Adapter - Michael Ossmann, Great Scott Gadgets.zip2011-12-23 02:33 23M 
[   ]Runtime Firmware Integrity Verification What Can Now Be Achieved - Yves-Alexis Perez and Loic Duflot, ANSSI .pdf2011-12-23 02:29 288K 
[   ]Security Defect Metrics for Targeted Fuzzing - Dustin Duran, Matt Miller, David Weston, Microsoft.pptx2011-12-23 02:28 700K 
[   ]Showing How Security Has (And Hasn't) Improved, After Ten Years Of Trying -Dan Kaminski, Adam Cecchetti and Mike Eddington, Doxpara & Deja Vu Security.pptx2011-12-23 02:29 2.0M 
[   ]SMS-o-Death From Analyzing To Attacking Mobile Phones on a Large Scale - Nico Golde and Collin Mulliner, TU-Berlin.pdf2011-12-23 02:29 6.5M 
[   ]Stale Pointers Are The New Black - Vincenzo Iozzo and Giovanni Gola, Zynamics GmbH.pdf2011-12-23 02:28 2.4M 
[   ]The Law of Web Application Hacking - Marcia Hofmann, EFF.pdf2011-12-23 02:27 247K 
[   ]Understanding and Exploiting Flash ActionScript Vulnerabilities - Haifei Li, Fortinet.pdf2011-12-23 02:27 838K 
[   ]Understanding and Exploiting Flash ActionScript Vulnerabilities - Haifei Li, Fortinet.ppt2011-12-23 02:27 1.4M 
[   ]Welcome to Rootkit Country - Graeme Neilson, Aura Software Security.odp2011-12-23 02:28 11M 
Indices 1.1