1 |
|
Showmecon 2014 - Protecting The Seams:Military Doctrine Applied To Application And Network Security Paul Vencill |
10 years, 4 months |
Securitytube_Poster |
|
4391 |
None |
2 |
|
Showmecon 2014 - Start With The Bpt Then Worry About The Apt! Kevin Cardwel |
10 years, 4 months |
Securitytube_Poster |
|
3910 |
None |
3 |
|
Showmecon 2014 - Cognitive Injection Andy Ellis |
10 years, 4 months |
Securitytube_Poster |
|
3864 |
None |
4 |
|
Showmecon 2014 - Inside The World’S Most Dangerous Search Engine |
10 years, 4 months |
Securitytube_Poster |
|
4313 |
None |
5 |
|
Showmecon 2014 - Hacking To Get Caught: A Concept For Adversary Replication And Penetration Testing |
10 years, 4 months |
Securitytube_Poster |
|
4838 |
None |
6 |
|
Showmecon 2014 - Power-Ups And Princesses: What Video Games Taught Me About Building A Security Awareness Program |
10 years, 4 months |
Securitytube_Poster |
|
4069 |
None |
7 |
|
Showmecon 2014 - Powershell And You: Using Microsoft’S Post-Exploitation Language |
10 years, 4 months |
Securitytube_Poster |
|
3838 |
None |
8 |
|
Showmecon 2014 - Dropping Docs On Darknets: How People Got Caught |
10 years, 4 months |
Securitytube_Poster |
|
3860 |
None |
9 |
|
Showmecon 2014 - The Call Of Community: Modern Warfare |
10 years, 4 months |
Securitytube_Poster |
|
3553 |
None |
10 |
|
Showmecon 2014 - Physical (In)Security – It’S Not All About Cyber |
10 years, 4 months |
Securitytube_Poster |
|
3664 |
None |
11 |
|
Showmecon 2014 - Bending And Twisting Networks |
10 years, 4 months |
Securitytube_Poster |
|
3592 |
None |
12 |
|
Showmecon 2014 - Here, Let Me Hold That For You. Consumer Metadata And Its Dangers |
10 years, 4 months |
Securitytube_Poster |
|
3734 |
None |
13 |
|
Troopers 14 - Implementing An Usb Host Driver Fuzzer - Daniel Mende |
10 years, 4 months |
Securitytube_Poster |
|
4102 |
None |
14 |
|
Troopers 14 - 20 Ways Past Secure Boot - Job De Haas |
10 years, 4 months |
Securitytube_Poster |
|
4572 |
None |
15 |
|
Troopers 14 - Georg Bakos - Keynote |
10 years, 4 months |
Securitytube_Poster |
|
3506 |
None |
16 |
|
Troopers 14 - Why Ipv6 Security Is So Hard - Enno Rey |
10 years, 4 months |
Securitytube_Poster |
|
3943 |
None |
17 |
|
Troopers 14 - Get Over It: Privacy Is Good For Security - Rob Lee |
10 years, 4 months |
Securitytube_Poster |
|
3728 |
None |
18 |
|
Troopers14 - How To Work Towards Pharma Compliance For Cloud Computing - Martijn Jansen |
10 years, 4 months |
Securitytube_Poster |
|
3949 |
None |
19 |
|
Troopers 14 - Psychology Of Security - Stefan Schumacher |
10 years, 4 months |
Securitytube_Poster |
|
3988 |
None |
20 |
|
Troopers 14 - Bro: A Flexible Open-Source Platform - Robin Summer |
10 years, 4 months |
Securitytube_Poster |
|
3823 |
None |
21 |
|
Troopers14 - Anti-Forensics On Sap Systems - Juan Perez-Etchegoyen &Amp; Will Vandevanter |
10 years, 4 months |
Securitytube_Poster |
|
3700 |
None |
22 |
|
Troopers14 - Granular Trust; Making It Work - Toby Kohlenberg |
10 years, 4 months |
Securitytube_Poster |
|
3588 |
None |
23 |
|
Troopers 14 - How I Latch On Me And Protect My Digital Life Against Passwords - Chema Alonso |
10 years, 4 months |
Securitytube_Poster |
|
4159 |
None |
24 |
|
Troopers 14 - Sap Businessobjects Attacks - Juan Perez-Etchegoyen &Amp; Will Vandevanter |
10 years, 4 months |
Securitytube_Poster |
|
3860 |
None |
25 |
|
Troopers14 - Compromise-As-A-Service: Our Pleazure - Matthias Luft &Amp; Felix Wilhelm) |
10 years, 4 months |
Securitytube_Poster |
|
3881 |
None |
26 |
|
Troopers14 - Risks In Hosted Sap Environments - Andreas Wiegenstein &Amp; Xu Jia |
10 years, 4 months |
Securitytube_Poster |
|
4240 |
None |
27 |
|
Crypto 2013 - On The Indifferentiability Of Key-Alternating Ciphers |
10 years, 3 months |
Securitytube_Poster |
|
3587 |
None |
28 |
|
Crypto 2013 - How To Run Turing Machines On Encrypted Data |
10 years, 3 months |
Securitytube_Poster |
|
3642 |
None |
29 |
|
Crypto 2013 - Learning With Rounding, Revisited - New Reduction, Prope ... |
10 years, 3 months |
Securitytube_Poster |
|
3501 |
None |
30 |
|
Troopers 14 - Injecting Evil Code In Your Sap J2ee Systems - Alexander Polyakov &Amp; Dimitry Chastuhin |
10 years, 3 months |
Securitytube_Poster |
|
4067 |
None |
31 |
|
Troopers 14 - Sap's Network Protocols Revisited - Martin Gallo |
10 years, 3 months |
Securitytube_Poster |
|
3794 |
None |
32 |
|
Troopers 14 - Osmosis - Christian Sielaff &Amp; Daniel Hauenstein |
10 years, 3 months |
Securitytube_Poster |
|
4015 |
None |
33 |
|
Troopers 14 - Security And Sdn -- A Perfect Fit Or Oil-And-Water? - Ivan Pepelnjak |
10 years, 3 months |
Securitytube_Poster |
|
3834 |
None |
34 |
|
Troopers 14 - What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek &Amp; Joseph Moti |
10 years, 3 months |
Securitytube_Poster |
|
3592 |
None |
35 |
|
Troopers 14 - Easy Ways To Bypass Anti-Virus Systems - Attila Marosi |
10 years, 3 months |
Securitytube_Poster |
|
4556 |
None |
36 |
|
Troopers 14 - The Three Billion Dollar App - Vladimir Wolstencroft |
10 years, 3 months |
Securitytube_Poster |
|
3656 |
None |
37 |
|
Troopers 14 - Closing Remarks - Enno Rey |
10 years, 3 months |
Securitytube_Poster |
|
3591 |
None |
38 |
|
Troopers 14 - Making (And Breaking) An 802.15.4 Wids - Sergey Bratus, Javier Vazquez, Ryan Speers |
10 years, 3 months |
Securitytube_Poster |
|
4049 |
None |
39 |
|
Troopers 14 - Modern Smartphone Forensics - Vladimir Katalov |
10 years, 3 months |
Securitytube_Poster |
|
3867 |
1 |
40 |
|
Troopers 14 - Vulnerability Classification In The Saas Era - Noam Liran |
10 years, 3 months |
Securitytube_Poster |
|
3631 |
None |
41 |
|
Challenge 6: Digest Authentication Reloaded |
10 years, 3 months |
Securitytube_Poster |
|
3457 |
None |
42 |
|
Crypto 2013 - Practical Multilinear Maps Over The Integers |
10 years, 3 months |
Securitytube_Poster |
|
3667 |
None |
43 |
|
Crypto 2013 - Sieve-In-The-Middle: Improved Mitm Attacks |
10 years, 3 months |
Securitytube_Poster |
|
3698 |
None |
44 |
|
Crypto 2013 - Plain Versus Randomized Cascading-Based Key-Length Extension For Block Ciphers |
10 years, 3 months |
Securitytube_Poster |
|
3829 |
None |
45 |
|
Troopers 14 - Keynote - Fx |
10 years, 3 months |
Securitytube_Poster |
|
3445 |
None |
46 |
|
Crypto 2013 - Secure Signatures And Chosen Ciphertext Security In A Quantum Computing World |
10 years, 3 months |
Securitytube_Poster |
|
3599 |
None |
47 |
|
Bsides Nashville 2014 - Welocome To Bsides Nashville |
10 years, 3 months |
Securitytube_Poster |
|
3598 |
None |
48 |
|
Bsides Nashville 2014 - Jack Daniel (@Jack_Daniel): Bsides, Harmonicas, And Communication Skills |
10 years, 3 months |
Securitytube_Poster |
|
4281 |
None |
49 |
|
Challenge 7: Cracking Digest Authentication |
10 years, 3 months |
Securitytube_Poster |
|
5098 |
None |
50 |
|
Crypto 2013 - Quantum One-Time Programs - (Extended Abstract) |
10 years, 3 months |
Securitytube_Poster |
|
3217 |
None |
51 |
|
Crypto 2013 - Practical Bootstrapping In Quasilinear Time |
10 years, 3 months |
Securitytube_Poster |
|
3421 |
None |
52 |
|
Crypto 2013 - Fast Cut-And-Choose Based Protocols For Malicious And Covert Adversaries |
10 years, 3 months |
Securitytube_Poster |
|
3241 |
None |
53 |
|
Troopers14 - Medical Device Cyber Security: The First 164 Years - Kevin Fu |
10 years, 3 months |
Securitytube_Poster |
|
3180 |
None |
54 |
|
Bsides Nashville 2014 - Eve Adams (@Hackerhuntress): Attack Paths: Breaking Into Infosec From It Or Other Totally Different Fields |
10 years, 3 months |
Securitytube_Poster |
|
3766 |
None |
55 |
|
Bsides Nashville 2014 - Adam Len Compton (@Tatanus): Learn From Your Mistakes |
10 years, 3 months |
Securitytube_Poster |
|
2850 |
None |
56 |
|
Bsides Nashville 2014 - Scott Thomas (@Secureholio): Beating The Infosec Learning Curve Without Burning Out |
10 years, 3 months |
Securitytube_Poster |
|
3020 |
None |
57 |
|
Challenge 8: Broken Authentication |
10 years, 3 months |
Securitytube_Poster |
|
3390 |
None |
58 |
|
Bsides Nashville 2014 - Branden Miller (@Cowboysfaninky): Sun Tzu Was A Punk! Confucius Was An Infosec Rockstar! |
10 years, 3 months |
Securitytube_Poster |
|
2957 |
None |
59 |
|
Bsides Nashville 2014 - Russell Butturini (@Tcstoolhax0r): Making Mongo Cry: Automated Nosql Exploitation With Nosqlmap |
10 years, 3 months |
Securitytube_Poster |
|
3046 |
None |
60 |
|
Bsides Nashville 2014 - Matt Smith: Buy Viagra! |
10 years, 3 months |
Securitytube_Poster |
|
2892 |
None |
61 |
|
Bsides Nashville 2014 - Stewart Fey: How Do I Hack Thee? Let Me Count The Ways |
10 years, 3 months |
Securitytube_Poster |
|
2845 |
None |
62 |
|
Bsides Nashville 2014 - Adam John (@Ajohn76): Healthcare Security, Which Protocal? |
10 years, 3 months |
Securitytube_Poster |
|
2656 |
None |
63 |
|
Bsides Nashville 2014 - Ben Miller (@Securithid): Why You Can't Prove You're Pwnd, But You Are! |
10 years, 3 months |
Securitytube_Poster |
|
2813 |
None |
64 |
|
Bsides Nashville 2014 - Paul Coggin: (@Paulcoggin): Bending And Twisting Networks |
10 years, 3 months |
Securitytube_Poster |
|
2854 |
None |
65 |
|
Challenge 9: Session Id Analysis |
10 years, 3 months |
Securitytube_Poster |
|
3063 |
None |
66 |
|
Bsides Nashville 2014 - Rafal Los (@Wh1t3rabbit): Succeeding With Enterprise Software Security Key Performance Indicators |
10 years, 3 months |
Securitytube_Poster |
|
2677 |
None |
67 |
|
Bsides Nashville 2014 - Kevin Riggs (@Adubiousdude): Scaling Security In The Enterprise: Making People A Stronger Link |
10 years, 3 months |
Securitytube_Poster |
|
2655 |
None |
68 |
|
Bsides Nashville 2014 - Applying Analog Thinking To Digial Networks Winn Schwartu (@Winnschwartau) |
10 years, 3 months |
Securitytube_Poster |
|
2643 |
None |
69 |
|
Bsides Nashville 2014 - Mark Kikta (@B31tf4c3): Seeing Purple: Hybrid Security Teams For The Enterprise |
10 years, 3 months |
Securitytube_Poster |
|
2711 |
None |
70 |
|
Offensive Computer Security 2014 - Midterm #2 Review &Amp; Exploit Development |
10 years, 3 months |
Securitytube_Poster |
|
2937 |
None |
71 |
|
Offensive Computer Security 2014 - Lecture 19 (Exploit Development 105) |
10 years, 3 months |
Securitytube_Poster |
|
2746 |
None |
72 |
|
Offensive Computer Security 2014 - Hw7 Wireshark Video |
10 years, 3 months |
Securitytube_Poster |
|
3118 |
None |
73 |
|
Challenge 10: Session Id Analysis Ii |
10 years, 3 months |
Securitytube_Poster |
|
2439 |
None |
74 |
|
Offensive Computer Security 2014 - Lecture 22 (Metasploit) |
10 years, 3 months |
Securitytube_Poster |
|
3297 |
1 |
75 |
|
Offensive Computer Security 2014 - Lecture 23 (Post Exploitation) |
10 years, 3 months |
Securitytube_Poster |
|
3058 |
1 |
76 |
|
Offensive Computer Security 2014 - Lecture 25 (Revisiting Old Topics) |
10 years, 3 months |
Securitytube_Poster |
|
2938 |
None |
77 |
|
Offensive Computer Security 2014 - Lecture 26 Social Engineering |
10 years, 3 months |
Securitytube_Poster |
|
3043 |
None |
78 |
|
Offensive Computer Security 2014 - Lecture 20 Return Oriented Programming (Hands On) |
10 years, 3 months |
Securitytube_Poster |
|
3306 |
None |
79 |
|
Cerias - Women In Cyber Security |
10 years, 3 months |
Securitytube_Poster |
|
3851 |
None |
80 |
|
Cerias - Beehive: Large-Scale Log Analysis For Detecting Suspicious Activity In Enterprise Networks |
10 years, 3 months |
Securitytube_Poster |
|
3297 |
None |
81 |
|
Challenge 10: Session Id Analysis Ii |
10 years, 3 months |
Securitytube_Poster |
|
2902 |
None |
82 |
|
Cerias - Secure And Private Outsourcing To Untrusted Cloud Servers |
10 years, 3 months |
Securitytube_Poster |
|
2776 |
None |
83 |
|
Cerias - Technical Tradeoffs In The Nsa's Mass Phone Call Program |
10 years, 3 months |
Securitytube_Poster |
|
2746 |
None |
84 |
|
Cerias - Why So Cerias!? Why We're Losing And What To Do About It. |
10 years, 3 months |
Securitytube_Poster |
|
2940 |
None |
85 |
|
Cerias - Online Privacy Agreements, Is It Informed Consent? |
10 years, 3 months |
Securitytube_Poster |
|
2731 |
None |
86 |
|
Cerias Info. Sec. Symposium 2014 - Awards - Purdue University |
10 years, 3 months |
Securitytube_Poster |
|
2677 |
None |
87 |
|
Cerias - Integrity Levels: A New Paradigm For Protecting Computing Systems |
10 years, 3 months |
Securitytube_Poster |
|
2835 |
None |
88 |
|
Cerias - Machine Intelligence For Biometric And On-Line Security |
10 years, 3 months |
Securitytube_Poster |
|
2815 |
None |
89 |
|
Challenge 11: Session Id Analysis Iii |
10 years, 3 months |
Securitytube_Poster |
|
2587 |
None |
90 |
|
Cerias - General-Purpose Secure Computation And Outsourcing |
10 years, 3 months |
Securitytube_Poster |
|
2984 |
None |
91 |
|
Cerias - Differentially Private Publishing Of Geospatial Data |
10 years, 3 months |
Securitytube_Poster |
|
2732 |
None |
92 |
|
Cerias - Whole Genome Sequencing: Innovation Dream Or Privacy Nightmare? |
10 years, 3 months |
Securitytube_Poster |
|
3163 |
None |
93 |
|
Cerias - Minimizing Private Data Disclosures In The Smart Grid |
10 years, 3 months |
Securitytube_Poster |
|
2870 |
None |
94 |
|
Cerias - Using Probabilistic Generative Models For Ranking Risks Of Android Apps |
10 years, 3 months |
Securitytube_Poster |
|
2925 |
None |
95 |
|
Cerias - I'M Not Stealing, I'M Merely Borrowing - Plagiarism In Smartphone App Markets |
10 years, 3 months |
Securitytube_Poster |
|
2861 |
None |
96 |
|
Challenge 12: Decrypting Ssl Traffic |
10 years, 3 months |
Securitytube_Poster |
|
3419 |
None |
97 |
|
Cerias - A Semantic Baseline For Spam Filtering |
10 years, 3 months |
Securitytube_Poster |
|
2940 |
None |
98 |
|
Cerias - Identity-Based Internet Protocol Network |
10 years, 3 months |
Securitytube_Poster |
|
2874 |
None |
99 |
|
Cerias - Towards Automated Problem Inference From Trouble Tickets |
10 years, 3 months |
Securitytube_Poster |
|
2745 |
None |
100 |
|
Cerias - Regulatory Compliance Software Engineering |
10 years, 3 months |
Securitytube_Poster |
|
3303 |
None |