Search for "rootkit"
next
51 min
Abusing your Firmware to backdoor the kernel
56 min
Achieving a permanent stealthy compromise of user accounts…
76 min
SAP Security and the Enterprise
49 min
Introduction to syscall proxying and applications for in…
56 min
Über die Durchsetzung industrieller Interessen um jeden…
63 min
Moving Beyond Single Points of Failure for Software…
54 min
Unlocking God Mode on Linux
58 min
From the Outside Looking In
28 min
or how we learned to stop worrying and love the NSA
54 min
The history and costs of government exceptional access
next