RuhrSec/RuhrSec 2016/RuhrSec 2016 An Abusive Relationship with AngularJS v2 , Mario Heiderich.en.transcribed.srt |
152 KB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 An Abusive Relationship with AngularJS v2 , Mario Heiderich.mp4 |
48 MB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 Automatic Extraction of Indicators of Compromise for Web App. , Marco Balduzzi.en.transcribed.srt |
72 KB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 Automatic Extraction of Indicators of Compromise for Web App. , Marco Balduzzi.mp4 |
56 MB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 Cache Side-Channel Attacks and the case of Rowhammer , Daniel Gruss.en.transcribed.srt |
91 KB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 Cache Side-Channel Attacks and the case of Rowhammer , Daniel Gruss.mp4 |
41.9 MB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 Code-Reuse Attacks and Beyond , Thorsten Holz.en.transcribed.srt |
90 KB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 Code-Reuse Attacks and Beyond , Thorsten Holz.mp4 |
41.6 MB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 Eavesdropping on WebRTC Communication with Funny Cat Pictures , Martin Johns.mp4 |
41.2 MB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 Hacking with Unicode in 2016 , Mathias Bynens.en.transcribed.srt |
141 KB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 Hacking with Unicode in 2016 , Mathias Bynens.mp4 |
52.6 MB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 Java deserialization vulnerabilities - The forgotten bug class , Matthias Kaiser.en.transcribed.srt |
107 KB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 Java deserialization vulnerabilities - The forgotten bug class , Matthias Kaiser.mp4 |
46.7 MB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 On Securing Legacy Software Against Code-Reuse Attacks , Lucas Vincenzo Davi.en.transcribed.srt |
73 KB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 On Securing Legacy Software Against Code-Reuse Attacks , Lucas Vincenzo Davi.mp4 |
41.2 MB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 On the Security of Browser Extensions , Nicolas Golubovic.en.transcribed.srt |
61 KB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 On the Security of Browser Extensions , Nicolas Golubovic.mp4 |
48 MB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 The DROWN Attack , Sebastian Schinzel.en.transcribed.srt |
110 KB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 The DROWN Attack , Sebastian Schinzel.mp4 |
46.5 MB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 The beast within - Evading dynamic malware analysis using Microsoft COM , Ralf Hund.mp4 |
56.1 MB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 Transport Layer Security – TLS 1.3 and backwards security issues , Jörg Schwenk.en.transcribed.srt |
84 KB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 Transport Layer Security – TLS 1.3 and backwards security issues , Jörg Schwenk.mp4 |
50.6 MB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 Closing by Marcus Niemietz - YouTube.en.transcribed.srt |
7 KB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 Closing by Marcus Niemietz - YouTube.mp4 |
5.7 MB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 Opening by Marcus Niemietz.en.transcribed.srt |
21 KB |
RuhrSec/RuhrSec 2016/RuhrSec 2016 Opening by Marcus Niemietz.mp4 |
11.4 MB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 0-RTT Key Exchange with Full Forward Secrecy , Prof. Dr. Tibor Jager.mp4 |
38.8 MB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 A new categorization system for Side-channel attacks on mo... , Dr. Veelasha Moonsamy.en.transcribed.srt |
87 KB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 A new categorization system for Side-channel attacks on mo... , Dr. Veelasha Moonsamy.mp4 |
42 MB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 Advanced SSL TLS Deployment Strategies , Frederik Braun.en.transcribed.srt |
47 KB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 Advanced SSL TLS Deployment Strategies , Frederik Braun.mp4 |
24.2 MB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 Black-Box Security Analysis of State Machine Implementations , Dr. Joeri de Ruiter.en.transcribed.srt |
106 KB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 Black-Box Security Analysis of State Machine Implementations , Dr. Joeri de Ruiter.mp4 |
61.6 MB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 Breaking and Fixing a Cryptocurrency , Martin Grothe.en.transcribed.srt |
107 KB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 Breaking and Fixing a Cryptocurrency , Martin Grothe.mp4 |
63.8 MB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 Five Years of Android Security Research the Good, the Bad... , Dr. Sven Bugiel.en.transcribed.srt |
120 KB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 Five Years of Android Security Research the Good, the Bad... , Dr. Sven Bugiel.mp4 |
59.1 MB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 How to Build Hardware Trojans , Prof. Dr. Christof Paar.en.transcribed.srt |
132 KB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 How to Build Hardware Trojans , Prof. Dr. Christof Paar.mp4 |
61.7 MB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 How to Hack Your Printer , Jens Müller.en.transcribed.srt |
91 KB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 How to Hack Your Printer , Jens Müller.mp4 |
46.8 MB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 Opening , Marcus Niemietz.mp4 |
12.4 MB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 Rowhammer Attacks A Walkthrough Guide , Dr. Clémentine Maurice & Daniel Gruss.en.transcribed.srt |
110 KB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 Rowhammer Attacks A Walkthrough Guide , Dr. Clémentine Maurice & Daniel Gruss.mp4 |
54.8 MB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 SSH Beyond Confidentiality and Integrity in Practice , Prof Dr. Kenny Paterson.en.transcribed.srt |
137 KB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 SSH Beyond Confidentiality and Integrity in Practice , Prof Dr. Kenny Paterson.mp4 |
81.6 MB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 Secrets of the Google Vulnerability Reward Program , Krzysztof Kotowicz.en.transcribed.srt |
97 KB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 Secrets of the Google Vulnerability Reward Program , Krzysztof Kotowicz.mp4 |
49.5 MB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 Teach a Man to Phish and You Feed Him for a Lifetime , Armin Buescher.en.transcribed.srt |
86 KB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 Teach a Man to Phish and You Feed Him for a Lifetime , Armin Buescher.mp4 |
88.4 MB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 The (In)Security of Automotive Remote Keyless Entry Systems..., Dr. David Oswald.en.transcribed.srt |
111 KB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 The (In)Security of Automotive Remote Keyless Entry Systems..., Dr. David Oswald.mp4 |
58.8 MB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 Using Microarchitectural Design to Break KASLR and More , Anders Fogh.en.transcribed.srt |
102 KB |
RuhrSec/RuhrSec 2017/RuhrSec 2017 Using Microarchitectural Design to Break KASLR and More , Anders Fogh.mp4 |
55.3 MB |
RuhrSec/RuhrSec 2018/RuhrSec 2018 Conseq. of Compl. in G. Instant Messaging u. the E. of WhatsApp & Signal - P. Rosler.mp4 |
40.3 MB |
RuhrSec/RuhrSec 2018/RuhrSec 2018 Don't trust the DOM Breaking XSS mitigations via Script Gadgets - Sebastian Lekies.mp4 |
35.9 MB |
RuhrSec/RuhrSec 2018/RuhrSec 2018 Efail Breaking S MIME and OpenPGP Email Encryption - D. Poddebniak & C. Dresen.mp4 |
33.2 MB |
RuhrSec/RuhrSec 2018/RuhrSec 2018 Exploring ROCA Fun & troubles with RSA keypairs - Dr. Petr Svenda.mp4 |
88.8 MB |
RuhrSec/RuhrSec 2018/RuhrSec 2018 Finding security vulnerabilities with modern fuzzing techniques - Rene Freingruber.mp4 |
35.5 MB |
RuhrSec/RuhrSec 2018/RuhrSec 2018 From Discovering Vulnerabilities to Getting Them Fixed At Scale - Dr. Ben Stock.mp4 |
34.5 MB |
RuhrSec/RuhrSec 2018/RuhrSec 2018 How client-side compilers help attackers to gain code execution - Dr. Robert Gawlik.mp4 |
21.2 MB |
RuhrSec/RuhrSec 2018/RuhrSec 2018 Is there any Security (and Privacy) in the Internet of Things - Dr. David Oswald.mp4 |
36.9 MB |
RuhrSec/RuhrSec 2018/RuhrSec 2018 Keynote Securing the Dev. Lifecycle in Prod. Systems Engineering - Dr. Edgar Weippl.mp4 |
27.9 MB |
RuhrSec/RuhrSec 2018/RuhrSec 2018 Keynote Weird machines, exploitability and unexploitability - Thomas Dullien.mp4 |
30.8 MB |
RuhrSec/RuhrSec 2018/RuhrSec 2018 Opening - Marcus Niemietz.mp4 |
10.8 MB |
RuhrSec/RuhrSec 2018/RuhrSec 2018 Revisiting the X.509 Certification Path Validation - Dr. Falko Strenzke.mp4 |
28 MB |
RuhrSec/RuhrSec 2018/RuhrSec 2018 The ROBOT Attack - Hanno Bock.mp4 |
27.8 MB |
RuhrSec/RuhrSec 2018/RuhrSec 2018 The Story of Meltdown and Spectre - Dr. Daniel Gruss & Jann Horn.mp4 |
30.3 MB |
RuhrSec/RuhrSec 2018/RuhrSec 2018 Vulnerability handling process at Joomla - David Jardin.mp4 |
43.7 MB |
RuhrSec/RuhrSec 2019/RuhrSec 2019 1 Trillion Dollar Refund - How To Spoof PDF Signatures , Dr.-Ing. Vladislav Mladenov.mp4 |
9.6 MB |
RuhrSec/RuhrSec 2019/RuhrSec 2019 Are Microarchitectural Attacks still possible on ... , Erik Kraft & Michael Schwarz.mp4 |
10.9 MB |
RuhrSec/RuhrSec 2019/RuhrSec 2019 Artifical Intelligence in Cyber Security Threat ... , Tobias Burri & Elias Hazboun.mp4 |
5.6 MB |
RuhrSec/RuhrSec 2019/RuhrSec 2019 Automate the generation of security documentation , Andreas Kuehne & Jens Neuhalfen.mp4 |
5.2 MB |
RuhrSec/RuhrSec 2019/RuhrSec 2019 Browser fingerprinting past, present and possible future , Dr. Pierre Laperdrix.mp4 |
9.4 MB |
RuhrSec/RuhrSec 2019/RuhrSec 2019 Content-Security-Policies in mass-distributed web apps - doing the ... , David Jardin.mp4 |
18.2 MB |
RuhrSec/RuhrSec 2019/RuhrSec 2019 Don't Trust The Locals Exploiting Persistent ... , Marius Steffens & Dr. Ben Stock.mp4 |
8.7 MB |
RuhrSec/RuhrSec 2019/RuhrSec 2019 Greybox Automatic Exploit Generation for Heap Overflows , Sean Heelan.mp4 |
9.9 MB |
RuhrSec/RuhrSec 2019/RuhrSec 2019 Johnny, you are fired! - Spoofing OpenPGP... , Marcus Brinkmann & Damian Poddebniak.mp4 |
16.5 MB |
RuhrSec/RuhrSec 2019/RuhrSec 2019 Keynote How to statically detect insecure uses of crypto... , Prof. Dr. Eric Bodden.mp4 |
17.5 MB |
RuhrSec/RuhrSec 2019/RuhrSec 2019 Keynote Publish-and-Forget Longitudinal Privacy... , Ass.Prof. Dr. Christina Pöpper.mp4 |
52.7 MB |
RuhrSec/RuhrSec 2019/RuhrSec 2019 Opening , Marcus Niemietz.mp4 |
5.2 MB |
RuhrSec/RuhrSec 2019/RuhrSec 2019 Reversing Fraudulent Apps , Abdullah Joseph.mp4 |
25.7 MB |
RuhrSec/RuhrSec 2019/RuhrSec 2019 Social Engineering through Social Media profiling, scanning ... , Christina Lekati.mp4 |
14.7 MB |
RuhrSec/RuhrSec 2019/RuhrSec 2019 The Bicho backdooring CAN bus for remote car hacking , Sheila Berta.mp4 |
13.4 MB |
RuhrSec/RuhrSec logo.jpg |
11 KB |
RuhrSec/RuhrSec thank you.txt |
927 B |