Search for "rootkit"
next
51 min
Abusing your Firmware to backdoor the kernel
56 min
Achieving a permanent stealthy compromise of user accounts…
76 min
SAP Security and the Enterprise
49 min
Introduction to syscall proxying and applications for in…
56 min
Über die Durchsetzung industrieller Interessen um jeden…
63 min
Moving Beyond Single Points of Failure for Software…
54 min
Unlocking God Mode on Linux
58 min
From the Outside Looking In
28 min
or how we learned to stop worrying and love the NSA
55 min
Towards an open source binary firmware analysis framework
next