- Présentations
- Documents
- Infographies
Voice securityprotocol review
Fabio Pietrosanti
•
il y a 13 ans
Stealthy, Hypervisor-based Malware Analysis
Tamas K Lengyel
•
il y a 8 ans
Voice communication security
Fabio Pietrosanti
•
il y a 13 ans
EBPF and Linux Networking
PLUMgrid
•
il y a 8 ans
Android Radio Layer Interface
Chun-Yu Wang
•
il y a 13 ans
HitCon'14: On the Feasibility of Automatically Generating Android Component Hijacking Exploits
daoyuan0x
•
il y a 9 ans
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
Cyphort
•
il y a 9 ans
44CON London 2015 - Indicators of Compromise: From malware analysis to eradication
44CON
•
il y a 8 ans