2014 ShmooCon Proceedings
search
⌘Ctrlk
2014 ShmooCon Proceedings
  • Introduction
  • Foreword
  • ShmooCon
  • The Shmoo Group
  • Editor's Note
  • Schedule
  • ONE TRACK MIND
  • BUILD IT
    • ADD: Complicating Memory Forensics Through Memory Disarray
    • USBProxy
    • AV-Evasion With the Veil Framework
    • Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instant Messaging Platforms
  • BELAY IT
  • BRING IT ON
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

BUILD IT

hashtag
BUILD IT!

  1. ADD – Complicating Memory Forensics Through Memory Disarray

    • Jake Williams

    • Alissa Torres

  2. An Open and Affordable USB Man in the Middle Device

    • Dominic Spill

  3. AV Evasion with the Veil Framework

    • Christopher Truncer

    • TheGrayhound

    • Michael Wright

  4. Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instant Messaging Platforms

    • Jaime Sanchez

    • Pablo San Emeterio

PreviousSecurity Analyticschevron-leftNextADD: Complicating Memory Forensics Through Memory Disarraychevron-right

Last updated 7 years ago