
SyScan2014 Conference Slides
| Speaker | Title | Updated | Download |
|---|---|---|---|
| Charlie Miller and Chris Valasek | Car Hacking for Poories | 07/04/2014 | ![]() |
| Corey Kallenberg, Xeno Kovah, John Butterworth, Sam Cornwell | Setup for Failure: Defeating SecureBoot | 07/04/2014 | ![]() |
| Nils and Jon Butler | Mission mPOSsible | 07/04/2014 | |
| Daniel Bilar | Scientific Best Practices for Recurrent Problems in Computer Security R&D | 08/04/2014 | ![]() |
| Alfredo Ortega | Deep-Submicron Backdoor | 07/04/2014 | ![]() |
| Adam Laurie | RFIDler | 07/04/2014 | ![]() |
| Anton Sapozhnikov | Getting User Credentials is not only Admin's Privilege | 07/04/2014 | ![]() |
| Dean Carter and Shahn Harris | From New Zealand with Fail | 07/04/2014 | |
| Joxean Koret | Breaking Antivirus Software | 08/04/2014 | ![]() |
| Mathias Payer | Embracing the New Threat: Towards Automatically Self-Diversifying Malware | 07/04/2014 | ![]() |
| Josh "m0nk" Thomas | How to Train your SnapDragon: Exploring Power Regulation Frameworks on Android | 07/04/2014 | ![]() |
| Dr. Thaddeus (The) Grugq | Click and Dragger: Denial and Deception on Android Smartphones | 07/04/2014 | ![]() |
| Alex Plaskett and Nick Walker | Navigating a sea of Pwn?: Windows Phone 8 AppSec | 07/04/2014 | ![]() |
| Alex Ionescu | All about the RPC, LRPC, ALPC, and LPC in your PC | 07/04/2014 | |
| Snare and Rzn | Thunderbolts and Lightning: Very Very Frightening | 07/04/2014 | ![]() |
| Georg Wicherski | Linux Memory Forensics: A Real-Life Case Study | 09/04/2014 | ![]() |























