Event - Blue-Hat-Security-Briefings_BlueHat-Security-Briefings-Fall-2014-Sesions


BlueHat Security Briefing: Fall 2014 Keynote by Chris Betz[MP4] [0:27:08] [2014/11/25]
Keynote


BlueHat Security Briefing: Fall 2014 Botintime Phoenix: DGA-based Botnet - Stefano Zanero[MP4] [0:47:04] [2014/11/25]
Botintime - Phoenix: DGA-based Botnet Tracking and Intelligence Its common knowledge that a malicious domain automatically generated will not become popular and also an attacker will register a domain…


BlueHat Security Briefing: Fall 2014 Summary of Attacks against BIOS and Secure Boot - Yuriy Bulygin [MP4] [0:19:57] [2014/11/25]
UEFI - Summary of Attacks against BIOS and Secure BootA variety of attacks targeting platform firmware have been discussed publicly, drawing attention to the pre-boot and firmware components of the…


BlueHat Security Briefing: Fall 2014 Defining and Enforcing Intent Semantics at ABI level - Sergey…[MP4] [0:24:18] [2014/11/25]
Defining and Enforcing Intent Semantics at ABI levelDominant OS security policy designs treat a process as an opaque entity that has a "bag" of permissions to access some OS resources at any…