
About Course
Black Hat Asia 2015 part 2
Black Hat is returning to Asia again in 2015, and we have quite an event in store. Here the brightest professionals and researchers in the industry will come together for a total of four days–two days of deeply technical hands-on Training, followed by two days of the latest research and vulnerability disclosures at our Briefings.
Course Content
Black Hat Asia 2015 part 2
-
API Deobfuscator: Identifying Runtime – Obfuscated API Calls Via Memory Access Analysis
00:00 -
We Can Still Crack You! General Unpacking Method For Android Packer (no Root)
00:00 -
DABiD: The Powerful Interactive Android Debugger for Android Malware Analysis
00:00 -
Exploiting Social Navigation
00:00 -
Security Content Metadata Model with an Efficient Search Methodology For Real Time Monitoring…
00:00 -
Browsers Gone Wild
00:00 -
Hiding Behind Android Runtime (ART)
00:00 -
Bypassing Malware Detection Mechanisms in Online Banking
00:00 -
Relaying EMV Contactless Transactions Using Off-The-Self Android Devices
00:00 -
I Know Where You’ve Been: Geo-Inference Attacks Via The Browser Cache
00:00 -
The Nightmare Behind The Cross Platform Mobile Apps Dream
00:00 -
MLD Considered Harmful – Breaking Another IPv6 Subprotocol
00:00 -
Slime: Automated Anti-Sandboxing Disarmament System
00:00 -
Locknote: Conclusions and Key Takeaways from Black Hat 2015
00:00 -
Hacking the Wireless World with Software Defined Radio – 2.0
00:00
Student Ratings & Reviews
No Review Yet