DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Software Reverse of DPAPI - BlackHat DC 2010

Talk I did for BlackHat DC 2010 with DPAPI reverse engineering and a tool to decrypt things related to DPAPI

Technology 用戶端攻擊與防禦

1. Taien內部資安講座 III用戶端攻擊與防禦2013.02.05 @ Hiiir Inc.Taien Wang英屬維京群島商時間軸科技股份有限公司新創事業部…

Education UI Redressing

1. UI Redressing function PresentedBy() { document.write(“Jovin Lobo”) } 2. self.Intro() Works for Payatu…

Documents 13 Security Testing

Network Security Testing CS 155 Elie Bursztein Why testing security • Get a snapshot of the current security • Evaluate the capacity to face intrusion • Test backup…

Internet Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google

1. Anti-fraud and abuse research group Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google Joseph Bonneau, Elie Bursztein…

Internet Dialing Back Abuse on Phone Verified Accounts - CCS 2014

1. DIALING BACK PHONE VERIFIED ACCOUNT ABUSE Kurt Thomas, Dmytro Iatskiv, Elie Bursztein, Tadek Pietraszek, Chris Grier (Databricks), Damon McCoy (GMU) 2. Security &…

Documents An Analysis of Private Browsing Modes in Modern Browsers

An Analysis of Private Browsing Modes in Modern Browsers Gaurav Aggarwal and Elie Bursztein, Collin Jackson, Dan Boneh, USENIX (Aug.,2010) An Analysis of Private Browsing…