How to build a safe NFC validating system Matteo Collura (Eagle1753) & Matteo Beccaro (bughardy) [email protected] - [email protected].
ROP is Still Dangerous: Breaking Modern Defenses Nicholas Carlini et. al University of California, Berkeley USENIX Security 2014 Presenter: Yue Li Part.
Careto: Unmasking a New Level in APT-ware
Khoo
Hannibal
Exploiting Cisco Infrastructure 607
Home Computer Security and Privacy: Part One a presentation by Patrick Douglas Crispen Faculty Development Center California State University, Fullerton.
Exploits Against Software and How To Avoid Them Nicolas T. Courtois - University College of London.
Home Computer Security and Privacy: Firewalls and Exploit Management.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Crispen on Security: Home Computer Security Basics
Exploits Against Software and How To Avoid Them