Presentaciones de la BlackHat USA 2012

Ya están disponibles para descarga el material de las charlas que se dieron en la BlackHat USA 2012 pasado mes de julio en Las Vegas: A Scientific (But Non Academic) Study of How Malware Employs Anti-Debugging, Anti-Disassembly and Anti-Virtualization Technologies BH_US_12_Branco_Scientific_Academic_WP.pdf BH_US_12_Branco_Scientific_Academic_Slides.pdf A Stitch in Time Saves Nine: A Case of Multiple Operating System Vulnerability BH_US_12_Wojtczuk_A_Stitch_In_Time_WP.pdf BH_US_12_Wojtczuk_A_Stitch_In_Time_Slides.pdf Adventures in Bouncerland BH_US_12_Percoco_Adventures_in_Bouncerland_WP.pdf BH_US_12_Percoco_Bouncerland_Slides.pdf AMF Testing Made Easy! BH_US_12_Carettoni_AMF_Testing_WP.pdf BH_US_12_Carettoni_AMF_Testing_Slides.pdf Source.zip Are You My Type?
Leer más

Material de la OSCON 2012

La OSCON o Open Source CONference es una conferencia que se celebra anualmente en la que se habla del amplio abanico de productos y tecnologías de código abierto. La conferencia la organiza O’Reilly y fue celebrada entre el 16 y el 20 de julio en Portland, Oregon. La lista de presentaciones es bastante amplia y las hay para todos los gustos: Business Cloud Community Data Healthcare Open Hardware Mobile Geek Lifestyle Tools and Techniques Ops Programming Java & JVM Javascript & HTML5 Perl PHP Python UX Keynote Event Sponsored Sessions Education Business Leadership Day OpenStack Day Sponsored Tutorials
Leer más

Material de la C++Now! 2012

La C++Now! es una conferencia para entusiastas del lenguaje de programación C++ que se celebra en Auspen, Colorado. Este año se celebró durante el pasado mes de mayo. Ya están disponible para descarga tanto los vídeos como las presentaciones. Aquí tenéis la lista de los vídeos: Jon Kalb: Exception-Safe Coding in C++ (Part II) Jon Kalb: Exception-Safe Coding in C++ (Part I) Michael Caisse: Introduction to Modern C++ Techniques (Part II) Michael Caisse: Introduction to Modern C++ Techniques (Part I) Beman Dawes: Boosting Libraries for TR2 Bryce Adelstein-Lelbach, Matthew Anderson, Hartmut Kaiser: HPX: A C++11 parallel runtime system Karsten Ahnert, Mario Mulansk: Metaprogramming Applied to Numerical Problems Sean Parent: Value Semantics and Concepts-based Polymorphism Ale Contenti: C++ Component Extensions for WinRT Lucanus Simonson, Andrii Sydorchuk: Robust and efficient multi precision algorithms design Beman Dawes, Jeff Garland, Alisdair Meredith: Other C++11 Gems Andrew Lumsdaine, Larisse Voufo: ConceptClang: An Implementation Model for C++ Concepts Tony Van Eerd: How I Code and Why Patrick Mihelich: Linear programming made easy with Boost Proto Nat Goodspeed: Using Boost.
Leer más

Presentaciones de la Recon 2012

Ya están disponibles para descarga las presentaciones de la Recon 2012 celebrada el pasado mes de junio. Backside optical analysis hardware/software running on ICs - Slides (application/pdf - 3.2 MB) Be Social. Use Rewoltke. - Slides (application/pdf - 4.9 MB) Bootkit Threats: In-Depth Reverse Engineering & Defense - Slides (application/pdf - 3.9 MB) Compiler Internals: Exceptions and RTTI - Scripts (application/zip - 44.5 KB)Slides (application/pdf - 872.3 KB) Cryptographic Function Identification in Obfuscated Binary Programs - Slides (application/pdf - 3.
Leer más

Presentaciones Hackito Ergo Sum 2012

Ya están disponibles algunas de las presentaciones de la tercera edición de Hackito Ergo Sum, evento celebrado los 12, 13 y 14 de abril de 2012. [Keynote #1] by Cedric Blancher /PDF Slides [Keynote #2] by Fyodor Yarochkin /PDF Slides [Keynote #3] by Marc “van Hauser” Heuse /PDF Slides [Lockpickito Ergo Sum] by Walter Bergers /PDF Slides ["Secure Password Managers" and "Military-Grade Encryption" on Smartphones: Oh Really?] by Andrey Belenko & Dmitry Sklyarov /PDF Slides [Hardware backdooring is practical] by Jonathan Brossard & Florentin Demetrescu /PDF Slides [Cryptographic Function Identification in Obfuscated Binary Programs] by Joan Calvet /PDF Slides [Recent Advances in IPv6 Security] by Fernando Gont /PDF Slides [Hacking the NFC credit cards for fun and debit ; )] by Renaud Lifchitz /PDF Slides ["
Leer más

Material oficial de la Blackhat Europe 2012 disponible

Ya está disponible el material de la recién acabada BlackHat 2012 Europa. Parece que faltan algunas charlas. Si las ponen actualizaremos esta entrada. Axelle Apvrille - Guillaume LovetAn Attacker's Day into Virology: Human vs Computer White Paper Slides Antonios Atlasis - Attacking IPv6 Implementation Using Fragmentation White Paper Slides Archivo Michael BakerFinding Needles in Haystacks (The Size of Countries) White Paper Slides Andrey Belenko - Dmitry Sklyarov"Secure Password Managers" and "
Leer más

Presentaciones y vídeos de la ShmooCon 2012 disponibles

Ya nos avisaron en SecurityByDefault de que Georgia Weidman estaba subiendo los vídeos de esta conferencia sobre seguridad celebrada en Washington DC. Pero ya están tanto los vídeos como las presentaciones oficiales a disposición de todos. El listado de las mismas es: Keynote - Peter Gutmann - video Closing Plenary - Arlen, Marcus, and Potter - Doing InfoSec Right - video pt 1, pt 2 Ben Agre - Cool New Crypto - video Brad Antonlewicz - Attacking Proximity Card Access Systems - video atlas of d00m - < GHz or Bust- video Corey Benninger and Max Sobell - Intro to Near Field Communication (NFC) Mobile Security - video Nicholas (aricon) Berthaume - Java Backdoors and Cross Framework Abuse - video Brad Bowers - Building MASINT Capabilities on a Hackers Budget - slides James Caroland and Greg Conti - Lessons of the Kobayashi Maru: Cheating is Fundamental - video Clark et al - Inside the OODA Loop - video Kristin Paget - Credit Card Fraud: The Contactless Generation - video slides Dan G et al - SNSCat - video slides and code Tony DeLaGrange and Kevin Johnson - Whack-a-Mobile - video Hanni Fakhoury - Destroying Evidence Before it's "
Leer más

Presentaciones de la HITBSecConf2011

Una vez terminada la HITBSecConf2011 Malaysia, ya podemos acceder a las presentaciones: D1 LABS - VoIP Attacking CUCM.pdf D1 SIGINT - Jurre van Bergen and Youri van der Zwart - Abusing RFID.pdf D1 SIGINT - Muhammad Najmi Ahmad Zabidi - Compiling Features for Malcious Binaries.pdf D1T1 - Alex Kirk - Mobile Malware Analysis.pdf D1T1 - Andrea Barisani and Daniele Bianco - EMV Protocol and POS Physical Analysis.pdf D1T1 - Jonathan Brossard - Post Memory Corruption Analysis.
Leer más

Presentaciones de la Crypto 2011

Ya nos podemos descargar las presentaciones de la conferencia Crypto 2011 celebrada en Santa Barbara, California los pasados 14 al 18 de agosto. Leftover Hash Lemma, Revisited [slides] Random Oracle Reducibility [slides] Time-Lock Puzzles in the Random Oracle Model [slides] Physically Uncloneable Functions in the Universal Composition Framework [slides] Computer-Aided Security Proofs for the Working Cryptographer [slides] Illegitimi Non Carborundum [slides] Optimal Verification of Operations on Dynamic Sets [slides] Verificable Delegation of Computation over Large Datasets [slides] Secure Computation on the Web: Computing Without Simultaneous Interaction [slides] Memory Delegation [slides] Automatic Search of Attacks on Round-Reduced AES and Applications [slides] How to Improve Rebound Attacks [slides] A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack [slides] The PHOTON Family of Lightweight Hash Functions [slides] Perfectly-Secure Multiplication for any t n/3 [slides] The IPS Compiler: Optimizations, Variants and Concrete Efficiency [slides] 1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds [slides] Leakage-Resilient Zero Knowledge [slides] A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework [slides] Key-Evolution Schemes Resilient to Space-Bounded Leakage [slides] Generic Side-Channel Distinguishers: Improvements and Limitations [slides] Cryptography with Tamperable and Leaky Memory [slides] Tutorial Session — Fully Homomorphic Encryption, by Shai Halevi [slides] Merkle Puzzles in a Quantum World Classical Cryptographic Protocols in a Quantum World [slides] Position-Based Quantum Cryptography: Impossibility and Constructions [slides] Analyzing Blockwise Lattice Algorithms using Dynamical Systems [slides] Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions [slides] Tor and Circumvention: Lessons Learned [slides] Fully Homomorphic Encryption over the Integers with Shorter Public-Keys [slides] Fully Homomorphic Encryption for Ring-LWE and Security for Key Dependent Messages [slides] Bi-Deniable Public-Key Encryption [slides] Better Security for Deterministic Public-Key Encryption: The Auxillary-Input Setting [slides] The Collision Security of Tandem-DM in the Ideal Cipher Model [slides] Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions [slides] A New Variant of PMAC: Beyond the Birthday Bound [slides] Authenticated and Misuse-Resistant Encryption of Key-Dependent Data [slides] Round Optimal Blind Signatures [slides] Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups [slides] Constant-Rate Oblivious Transfer from Noisy Channels [slides] The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing [slides] Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials [slides] Inverting HFE Systems is Quasipolynomial for all Fields [slides] Smaller Decoding Exponents: Ball-Collision Decoding [slides] McEliece and Niederreiter Cryptosystems that Resist Quantum Fourier Sampling Attacks [slides] Fuente original
Leer más

Presentaciones de la Black Hat 2011

Ya disponemos de las presentaciones que se dieron en la Black Hat 2011. Os dejo el listado de las charlas a las que han subido la documentación: How a Hacker Has Helped Influence the Government - and Vice Versa Video Faces Of Facebook-Or, How The Largest Real ID Database In The World Came To Be White Paper Slides Video Security When Nano-seconds Count White Paper Slides Automated Detection of HPP Vulnerabilities in Web Applications White Paper Slides Exploiting Siemens Simatic S7 PLCs White Paper Slides Femtocells: A poisonous needle in the operator's hay stack White Paper Post Memory Corruption Memory Analysis White Paper Beyond files undeleting: OWADE White Paper Slides Physical Memory Forensics for Cache White Paper Slides Lives On The Line: Defending Crisis Maps in Libya, Sudan, and Pakistan White Paper Slides Legal Aspects of Cybersecurity–(AKA) CYBERLAW: A Year in Review, Cases, issues, your questions my (alleged) answers White Paper Slides Apple iOS Security Evaluation: Vulnerability Analysis and Data Encryption White Paper Slides Mobile Malware Madness, and How To Cap the Mad Hatters White Paper Slides USB: Undermining Security Barriers White Paper Slides Bit-squatting: DNS Hijacking without exploitation White Paper Slides Virtualization Under Attack: Breaking out of KVM White Paper Slides Exploiting the iOS Kernel White Paper Slides Spy-Sense: Spyware Tool for Executing Stealthy Exploits Against Sensor Networks White Paper Slides The Law of Mobile Privacy and Security Slides Smartfuzzing The Web: Carpe Vestra Foramina White Paper Slides Hacking Google Chrome OS White Paper Slides Don't Drop the SOAP: Real World Web Service Testing for Web Hackers White Paper Slides Archivo1 Archivo2 Chip & PIN is definitely broken White Paper Slides ARM exploitation ROPmap Slides Windows Hooks of Death: Kernel Attacks Through User-Mode Callbacks White Paper Slides SSL And The Future Of Authenticity Video Hacking .
Leer más