Goa 2015

FROM THE ARCHIVES

Download Collection

Inaugural Note by Shri Janardhana Swamy

Cyber Space by K D Nayak

DNS vs.SECURITY by Dr. Paul Vixie

Bounties & The Security Development Lifecycle - by Katie Moussouris

ECMA Script 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes, and everything else - by Mario Heiderich

Drone Attacks: How I hijacked a drone - by Rahul Sasi

ICS/SCADA SECURITY - ANALYSIS OF A BECKHOFF CX5020 PLC - by Hans Hoefken

The NSA Playset: RF Retroreflectors - by Michael Ossmann

Mobile self-defence - by Karsten Nohl

The Windows Sandbox Paradox - by James Forshaw

Attack and Defence in Radio and Communication Warfare - by Akib Sayyad

Analyzing Chrome crash reports at scale - by Abhishek Arya

Generic Executable Unpacking using Dynamic Binary Instrumentation - by Shubham Bansal

Hacking Tizen: The OS of Everything - by Ajin Abraham

Building custom scans for real world enterprise network - by Sanoop Thomas

Hunting and Decrypting Ghost communications using Memory Forensics - by Monnappa K.A

When the Sky is Falling: High-Volume Reflection/Amplification Attacks - by Manish Sinha

Parkomagic: a few words about the security of parking terminals - by Denis Makrushin

Pentesting a website with million lines of Javascript - by Lavakumar & Nafeez

Warning Ahead: Security Storms are Brewing in Your JavaScript - by Yuval Idan

Anatomy of a credit card stealing POS malware - by Amol Sarwate

Cold Boot Attack on DDR2 and DDR3 RAM - by Marko Schuba