FileMood

Download RuhrSec

RuhrSec

Name

RuhrSec

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

2.2 GB

Total Files

86

Hash

A3C3F3703996BF1558E8A9C2A7B782E0EEA867F8

/RuhrSec 2016/

RuhrSec 2016 An Abusive Relationship with AngularJS v2 , Mario Heiderich.en.transcribed.srt

156.1 KB

RuhrSec 2016 An Abusive Relationship with AngularJS v2 , Mario Heiderich.mp4

50.3 MB

RuhrSec 2016 Automatic Extraction of Indicators of Compromise for Web App. , Marco Balduzzi.en.transcribed.srt

73.3 KB

RuhrSec 2016 Automatic Extraction of Indicators of Compromise for Web App. , Marco Balduzzi.mp4

58.7 MB

RuhrSec 2016 Cache Side-Channel Attacks and the case of Rowhammer , Daniel Gruss.en.transcribed.srt

93.5 KB

RuhrSec 2016 Cache Side-Channel Attacks and the case of Rowhammer , Daniel Gruss.mp4

43.9 MB

RuhrSec 2016 Code-Reuse Attacks and Beyond , Thorsten Holz.en.transcribed.srt

92.3 KB

RuhrSec 2016 Code-Reuse Attacks and Beyond , Thorsten Holz.mp4

43.6 MB

RuhrSec 2016 Eavesdropping on WebRTC Communication with Funny Cat Pictures , Martin Johns.mp4

43.3 MB

RuhrSec 2016 Hacking with Unicode in 2016 , Mathias Bynens.en.transcribed.srt

144.4 KB

RuhrSec 2016 Hacking with Unicode in 2016 , Mathias Bynens.mp4

55.2 MB

RuhrSec 2016 Java deserialization vulnerabilities - The forgotten bug class , Matthias Kaiser.en.transcribed.srt

109.7 KB

RuhrSec 2016 Java deserialization vulnerabilities - The forgotten bug class , Matthias Kaiser.mp4

48.9 MB

RuhrSec 2016 On Securing Legacy Software Against Code-Reuse Attacks , Lucas Vincenzo Davi.en.transcribed.srt

75.1 KB

RuhrSec 2016 On Securing Legacy Software Against Code-Reuse Attacks , Lucas Vincenzo Davi.mp4

43.2 MB

RuhrSec 2016 On the Security of Browser Extensions , Nicolas Golubovic.en.transcribed.srt

62.5 KB

RuhrSec 2016 On the Security of Browser Extensions , Nicolas Golubovic.mp4

50.4 MB

RuhrSec 2016 The DROWN Attack , Sebastian Schinzel.en.transcribed.srt

112.7 KB

RuhrSec 2016 The DROWN Attack , Sebastian Schinzel.mp4

48.7 MB

RuhrSec 2016 The beast within - Evading dynamic malware analysis using Microsoft COM , Ralf Hund.mp4

58.8 MB

RuhrSec 2016 Transport Layer Security – TLS 1.3 and backwards security issues , Jörg Schwenk.en.transcribed.srt

85.9 KB

RuhrSec 2016 Transport Layer Security – TLS 1.3 and backwards security issues , Jörg Schwenk.mp4

53.1 MB

RuhrSec 2016 Closing by Marcus Niemietz - YouTube.en.transcribed.srt

7.0 KB

RuhrSec 2016 Closing by Marcus Niemietz - YouTube.mp4

6.0 MB

RuhrSec 2016 Opening by Marcus Niemietz.en.transcribed.srt

21.8 KB

RuhrSec 2016 Opening by Marcus Niemietz.mp4

12.0 MB

/RuhrSec 2017/

RuhrSec 2017 0-RTT Key Exchange with Full Forward Secrecy , Prof. Dr. Tibor Jager.mp4

40.6 MB

RuhrSec 2017 A new categorization system for Side-channel attacks on mo... , Dr. Veelasha Moonsamy.en.transcribed.srt

89.2 KB

RuhrSec 2017 A new categorization system for Side-channel attacks on mo... , Dr. Veelasha Moonsamy.mp4

44.1 MB

RuhrSec 2017 Advanced SSL TLS Deployment Strategies , Frederik Braun.en.transcribed.srt

48.6 KB

RuhrSec 2017 Advanced SSL TLS Deployment Strategies , Frederik Braun.mp4

25.4 MB

RuhrSec 2017 Black-Box Security Analysis of State Machine Implementations , Dr. Joeri de Ruiter.en.transcribed.srt

108.4 KB

RuhrSec 2017 Black-Box Security Analysis of State Machine Implementations , Dr. Joeri de Ruiter.mp4

64.6 MB

RuhrSec 2017 Breaking and Fixing a Cryptocurrency , Martin Grothe.en.transcribed.srt

109.5 KB

RuhrSec 2017 Breaking and Fixing a Cryptocurrency , Martin Grothe.mp4

66.9 MB

RuhrSec 2017 Five Years of Android Security Research the Good, the Bad... , Dr. Sven Bugiel.en.transcribed.srt

122.6 KB

RuhrSec 2017 Five Years of Android Security Research the Good, the Bad... , Dr. Sven Bugiel.mp4

62.0 MB

RuhrSec 2017 How to Build Hardware Trojans , Prof. Dr. Christof Paar.en.transcribed.srt

135.7 KB

RuhrSec 2017 How to Build Hardware Trojans , Prof. Dr. Christof Paar.mp4

64.7 MB

RuhrSec 2017 How to Hack Your Printer , Jens Müller.en.transcribed.srt

93.6 KB

RuhrSec 2017 How to Hack Your Printer , Jens Müller.mp4

49.1 MB

RuhrSec 2017 Opening , Marcus Niemietz.mp4

13.0 MB

RuhrSec 2017 Rowhammer Attacks A Walkthrough Guide , Dr. Clémentine Maurice & Daniel Gruss.en.transcribed.srt

113.0 KB

RuhrSec 2017 Rowhammer Attacks A Walkthrough Guide , Dr. Clémentine Maurice & Daniel Gruss.mp4

57.5 MB

RuhrSec 2017 SSH Beyond Confidentiality and Integrity in Practice , Prof Dr. Kenny Paterson.en.transcribed.srt

140.1 KB

RuhrSec 2017 SSH Beyond Confidentiality and Integrity in Practice , Prof Dr. Kenny Paterson.mp4

85.6 MB

RuhrSec 2017 Secrets of the Google Vulnerability Reward Program , Krzysztof Kotowicz.en.transcribed.srt

99.6 KB

RuhrSec 2017 Secrets of the Google Vulnerability Reward Program , Krzysztof Kotowicz.mp4

51.9 MB

RuhrSec 2017 Teach a Man to Phish and You Feed Him for a Lifetime , Armin Buescher.en.transcribed.srt

88.2 KB

RuhrSec 2017 Teach a Man to Phish and You Feed Him for a Lifetime , Armin Buescher.mp4

92.7 MB

RuhrSec 2017 The (In)Security of Automotive Remote Keyless Entry Systems..., Dr. David Oswald.en.transcribed.srt

113.5 KB

RuhrSec 2017 The (In)Security of Automotive Remote Keyless Entry Systems..., Dr. David Oswald.mp4

61.6 MB

RuhrSec 2017 Using Microarchitectural Design to Break KASLR and More , Anders Fogh.en.transcribed.srt

104.8 KB

RuhrSec 2017 Using Microarchitectural Design to Break KASLR and More , Anders Fogh.mp4

58.0 MB

/RuhrSec 2018/

RuhrSec 2018 Conseq. of Compl. in G. Instant Messaging u. the E. of WhatsApp & Signal - P. Rosler.mp4

42.3 MB

RuhrSec 2018 Don't trust the DOM Breaking XSS mitigations via Script Gadgets - Sebastian Lekies.mp4

37.6 MB

RuhrSec 2018 Efail Breaking S MIME and OpenPGP Email Encryption - D. Poddebniak & C. Dresen.mp4

34.8 MB

RuhrSec 2018 Exploring ROCA Fun & troubles with RSA keypairs - Dr. Petr Svenda.mp4

93.1 MB

RuhrSec 2018 Finding security vulnerabilities with modern fuzzing techniques - Rene Freingruber.mp4

37.2 MB

RuhrSec 2018 From Discovering Vulnerabilities to Getting Them Fixed At Scale - Dr. Ben Stock.mp4

36.1 MB

RuhrSec 2018 How client-side compilers help attackers to gain code execution - Dr. Robert Gawlik.mp4

22.2 MB

RuhrSec 2018 Is there any Security (and Privacy) in the Internet of Things - Dr. David Oswald.mp4

38.6 MB

RuhrSec 2018 Keynote Securing the Dev. Lifecycle in Prod. Systems Engineering - Dr. Edgar Weippl.mp4

29.3 MB

RuhrSec 2018 Keynote Weird machines, exploitability and unexploitability - Thomas Dullien.mp4

32.3 MB

RuhrSec 2018 Opening - Marcus Niemietz.mp4

11.4 MB

RuhrSec 2018 Revisiting the X.509 Certification Path Validation - Dr. Falko Strenzke.mp4

29.4 MB

RuhrSec 2018 The ROBOT Attack - Hanno Bock.mp4

29.2 MB

RuhrSec 2018 The Story of Meltdown and Spectre - Dr. Daniel Gruss & Jann Horn.mp4

31.7 MB

RuhrSec 2018 Vulnerability handling process at Joomla - David Jardin.mp4

45.9 MB

/RuhrSec 2019/

RuhrSec 2019 1 Trillion Dollar Refund - How To Spoof PDF Signatures , Dr.-Ing. Vladislav Mladenov.mp4

10.0 MB

RuhrSec 2019 Are Microarchitectural Attacks still possible on ... , Erik Kraft & Michael Schwarz.mp4

11.4 MB

RuhrSec 2019 Artifical Intelligence in Cyber Security Threat ... , Tobias Burri & Elias Hazboun.mp4

5.9 MB

RuhrSec 2019 Automate the generation of security documentation , Andreas Kuehne & Jens Neuhalfen.mp4

5.5 MB

RuhrSec 2019 Browser fingerprinting past, present and possible future , Dr. Pierre Laperdrix.mp4

9.9 MB

RuhrSec 2019 Content-Security-Policies in mass-distributed web apps - doing the ... , David Jardin.mp4

19.1 MB

RuhrSec 2019 Don't Trust The Locals Exploiting Persistent ... , Marius Steffens & Dr. Ben Stock.mp4

9.1 MB

RuhrSec 2019 Greybox Automatic Exploit Generation for Heap Overflows , Sean Heelan.mp4

10.4 MB

RuhrSec 2019 Johnny, you are fired! - Spoofing OpenPGP... , Marcus Brinkmann & Damian Poddebniak.mp4

17.4 MB

RuhrSec 2019 Keynote How to statically detect insecure uses of crypto... , Prof. Dr. Eric Bodden.mp4

18.4 MB

RuhrSec 2019 Keynote Publish-and-Forget Longitudinal Privacy... , Ass.Prof. Dr. Christina Pöpper.mp4

55.3 MB

RuhrSec 2019 Opening , Marcus Niemietz.mp4

5.4 MB

RuhrSec 2019 Reversing Fraudulent Apps , Abdullah Joseph.mp4

27.0 MB

RuhrSec 2019 Social Engineering through Social Media profiling, scanning ... , Christina Lekati.mp4

15.4 MB

RuhrSec 2019 The Bicho backdooring CAN bus for remote car hacking , Sheila Berta.mp4

14.0 MB

/

RuhrSec logo.jpg

10.8 KB

RuhrSec thank you.txt

0.9 KB

 

Total files 86


Copyright © 2025 FileMood.com