Black Hat Asia 2015 part 2

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat Asia 2015 part 2

Black Hat is returning to Asia again in 2015, and we have quite an event in store. Here the brightest professionals and researchers in the industry will come together for a total of four days–two days of deeply technical hands-on Training, followed by two days of the latest research and vulnerability disclosures at our Briefings.

Course Content

Black Hat Asia 2015 part 2

  • API Deobfuscator: Identifying Runtime – Obfuscated API Calls Via Memory Access Analysis
    00:00
  • We Can Still Crack You! General Unpacking Method For Android Packer (no Root)
    00:00
  • DABiD: The Powerful Interactive Android Debugger for Android Malware Analysis
    00:00
  • Exploiting Social Navigation
    00:00
  • Security Content Metadata Model with an Efficient Search Methodology For Real Time Monitoring…
    00:00
  • Browsers Gone Wild
    00:00
  • Hiding Behind Android Runtime (ART)
    00:00
  • Bypassing Malware Detection Mechanisms in Online Banking
    00:00
  • Relaying EMV Contactless Transactions Using Off-The-Self Android Devices
    00:00
  • I Know Where You’ve Been: Geo-Inference Attacks Via The Browser Cache
    00:00
  • The Nightmare Behind The Cross Platform Mobile Apps Dream
    00:00
  • MLD Considered Harmful – Breaking Another IPv6 Subprotocol
    00:00
  • Slime: Automated Anti-Sandboxing Disarmament System
    00:00
  • Locknote: Conclusions and Key Takeaways from Black Hat 2015
    00:00
  • Hacking the Wireless World with Software Defined Radio – 2.0
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet
ResearcherStore

Want to receive push notifications for all major on-site activities?