Security/BlackHat 2012: Difference between revisions

Jump to navigation Jump to search
Line 10: Line 10:


=== Interesting-sounding Blackhat and DEFCON sessions ===
=== Interesting-sounding Blackhat and DEFCON sessions ===
[https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Argyroudis Exploiting the jemalloc Memory Allocator: Owning Firefox's Heap]


[https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Shekyan Hacking with WebSockets]
[https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Rohlf Google Native Client - Analysis Of A Secure Browser Plugin Sandbox]
[https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Shah HTML5 Top 10 Threats – Stealth Attacks and Silent Exploits]


=== dinners/meetups ==
=== dinners/meetups ==
canmove, Confirmed users
4,854

edits

Navigation menu