2014 ShmooCon Proceedings
  • Introduction
  • Foreword
  • ShmooCon
  • The Shmoo Group
  • Editor's Note
  • Schedule
  • ONE TRACK MIND
    • Attacker Ghost Stories
    • CCTV - Setup, Attack Vectors and Laws
    • Security Analytics
  • BUILD IT
    • ADD: Complicating Memory Forensics Through Memory Disarray
    • USBProxy
    • AV-Evasion With the Veil Framework
    • Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instant Messaging Platforms
  • BELAY IT
    • A Critical Review of Spatial Analysis
    • “How I Met Your Mother” or The Brief and Secret History of Bletchley Park and How They Invented Cryp
    • Raising Costs for Your Attackers Instead of Your CFO
    • The “Science of Cyber” and the Next Generation of Security Tools
    • Unambiguous Encapsulation
  • BRING IT ON
    • Arms Race: The Story of (In)-Secure Bootloaders
    • How to Train your Snapdragon: Exploring Power Frameworks on Android
    • Syncing Mentorship Between Winners And Beginners
    • Technology Law Issues for Security Professionals
Powered by GitBook
On this page

BUILD IT

PreviousSecurity AnalyticsNextADD: Complicating Memory Forensics Through Memory Disarray

Last updated 6 years ago

BUILD IT!

    • Jake Williams

    • Alissa Torres

    • Dominic Spill

    • Christopher Truncer

    • TheGrayhound

    • Michael Wright

    • Jaime Sanchez

    • Pablo San Emeterio

ADD – Complicating Memory Forensics Through Memory Disarray
An Open and Affordable USB Man in the Middle Device
AV Evasion with the Veil Framework
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instant Messaging Platforms