• Speakers
  • Resume Clinic
  • Sponsors
  • Training
  • Registration
  • -->

    Goa 2015

    FROM THE ARCHIVES

    Download Collection

    Inaugural Note by Shri Janardhana Swamy

    Cyber Space by K D Nayak

    DNS vs.SECURITY by Dr. Paul Vixie

    Bounties & The Security Development Lifecycle - by Katie Moussouris

    ECMA Script 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes, and everything else - by Mario Heiderich

    Drone Attacks: How I hijacked a drone - by Rahul Sasi

    ICS/SCADA SECURITY - ANALYSIS OF A BECKHOFF CX5020 PLC - by Hans Hoefken

    The NSA Playset: RF Retroreflectors - by Michael Ossmann

    Mobile self-defence - by Karsten Nohl

    The Windows Sandbox Paradox - by James Forshaw

    Attack and Defence in Radio and Communication Warfare - by Akib Sayyad

    Analyzing Chrome crash reports at scale - by Abhishek Arya

    Generic Executable Unpacking using Dynamic Binary Instrumentation - by Shubham Bansal

    Hacking Tizen: The OS of Everything - by Ajin Abraham

    Building custom scans for real world enterprise network - by Sanoop Thomas

    Hunting and Decrypting Ghost communications using Memory Forensics - by Monnappa K.A

    When the Sky is Falling: High-Volume Reflection/Amplification Attacks - by Manish Sinha

    Parkomagic: a few words about the security of parking terminals - by Denis Makrushin

    Pentesting a website with million lines of Javascript - by Lavakumar & Nafeez

    Warning Ahead: Security Storms are Brewing in Your JavaScript - by Yuval Idan

    Anatomy of a credit card stealing POS malware - by Amol Sarwate

    Cold Boot Attack on DDR2 and DDR3 RAM - by Marko Schuba