πŸ§ͺ Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

Malware Analysis

Analysis and research of malicious software

152
Total Entries
129
Contributors
138
Unique Tags
66
Related Tags

Top Contributors

Aditya K Sood(8) Atul Alex(5) Jatin Kataria(5) Amol Sarwate(3) Anto Joseph(3)

Related Tags (16)

Show all 16 tags...

All Entries (152 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07TalkBlackhat Uncovering ‘NASty’ 5G Baseband Vulnerabilities through Dependency-Aware Fuzzing Kanika Guptareverse-engineeringfirmware-analysismobile-security+2
2025-08-06Tool demoBlackhat ARC – Artifact Reuse Comparator Rushikesh D Nandedkarstatic-analysisreverse-engineeringbinary-analysis+3
2025-08-06Tool demoBlackhat ParseAndC 4.0 - The Final Cut Source Code Parbati Kumar Mannareverse-engineeringbinary-analysiscode-analysis+4
2025-08-06Tool demoBlackhat ProcessInjection Chirag Savlapentestingred-teamingreverse-engineering+1
2025-08-06Tool demoBlackhat ROP ROCKET: Advanced Framework for Return-Oriented Programming Source Code Shiva Shashankreverse-engineeringexploitationpentesting+3
2025-08-06Tool demoBlackhat ShadowSeek: Combining Ghidra and Large Language Models for Advanced Binary Analysis Mohammed Tanveerreverse-engineeringbinary-analysisstatic-analysis+3
2025-08-06Tool demoBlackhat MORF – Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jmmobile-securityapp-securitymobile-pentesting+4
2025-08-06Tool demoBlackhat Realtic Sohan Simha Prabhakar, Samarth Bhaskar Bhatpentestingvulnerability-assessmentstatic-analysis+3
2025-08-06Tool demoBlackhat Varunastra: Securing the Depths of Docker V2 Source Code Devang Solankicontainer-securitydockerstatic-analysis+4
2025-08-06Tool demoBlackhat vet: Proactive Guardrails against Malicious OSS using Code Analysis Source Code Abhisek Dattastatic-analysissoftware-securitydevsecops+3
2025-08-06Tool demoBlackhat SmuggleShield - Protection Against HTML Smuggling Source Code Dhiraj Mishraweb-securitymalware-detectionbrowser-security+2
2025-04-04TalkBlackhat Standing on the Shoulders of Giants: De-Obfuscating WebAssembly Using LLVM Presentation Vikas Guptareverse-engineeringcode-analysissoftware-security
2025-04-04Tool demoBlackhat Decoy Mutex Source Code Madhukar Rainaransomware
2025-03-14TalkInsomnihack The Art of Malware Smuggling (Unmasking SVG-Based Attack Techniques) Dhiraj Mishramalware
2024-11-16TalkC0c0n Access for Sale: Inside the World of Ransomware Affiliates and Initial Access Brokers Nihar Sawant, Jaydev Joshiransomware
2024-11-15TalkC0c0n Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate Kartik Lalanautomotive-cybersecurityvulnerability-managementreverse-engineering+2
2024-11-15TalkC0c0n Know your Enemies: Deep Dive into Ransomware Threat Groups Niranjan Jayanandransomware
2024-11-06TalkBlackalps IDAT Loader: The Malware’s Camouflaged Weapon Niranjan Jayanandmalware
2024-10-02TalkVirus Bulletin Arming WinRAR: deep dive into APTs exploiting WinRAR’s 0-day vulnerability - a SideCopy case study Presentation Whitepaper Video Sathwik RAM Prakkireverse-engineeringvulnerability-managementapt+1
2024-08-30TalkHitb Sec Conf Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles Presentation Video Ravi Rajputweb-securitypentestingexploitation+4
2024-08-29TalkHitb Sec Conf COMMSEC: CoralRaider Targets Victims Data and Social Media Accounts Presentation Video Chetan Raghuprasadreverse-engineeringpentestingincident-response
2024-08-14TalkUsenix Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors Presentation Whitepaper Video Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyayreverse-engineeringvulnerability-managementsecurity-architecture+1
2024-04-19Tool demoBlackhat Malware clustering using unsupervised ML : CalMal Source Code Himanshu Anandmalware
2023-11-17TalkDeepsec Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption Shubham Dubeyvulnerability-managementreverse-engineeringexploitation+1
2023-09-23TalkNullcon Reverse Engineering RGB Keyboard Backlights With Linux Kernel Drivers Presentation Video Rishit Bansalreverse-engineering
2023-09-23TalkNullcon Your App Is Probably A Spyware…Or Is It? Presentation Gaurav Gogia, Pandurang Patilspyware
2023-08-13Tool demoBlackhat Advanced ROP Framework: Pushing ROP to Its Limits Presentation Whitepaper Source Code Video Shiva Shashankreverse-engineeringpentestingexploitation+3
2023-08-10TalkDefcon Hardware Backdooring an e-Scooter Arun Manereverse-engineeringindustrial-control-systems-securityvulnerability-management+2
2023-08-10TalkDefcon Wheels of Wonder: Unveiling Car Hacking Poetry Presentation Video Hrishikesh Somchatwarfirmware-analysisreverse-engineeringautomotive-cybersecurity+1
2023-08-07TalkC0c0n Cellibrite Premium Mobile Forensic tool iPhone analysis Vaibhav Kumarmobile-securitymobile-forensicsreverse-engineering+3
2023-08-07TalkC0c0n Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs Video Sathwik RAM Prakkiaptreverse-engineeringincident-response
2023-08-07TalkC0c0n Uncovering the Hidden Dangers Lurking as Android Apps using ML Algos Video Nikhil Prabhakarandroid-securitymobile-securityreverse-engineering+1
2023-08-07TalkC0c0n Generative AI and Cyber Crimes Video Brijesh Singhmalwaresecurity-awarenessrisk-management+2
2023-08-07TalkC0c0n Start Left SDLC Security with Open-Source DevSecOps Tooling Video Aswin Raj, Shruti M Gdevsecopssecure-developmentstatic-analysis+3
2023-08-06TalkC0c0n Developments in Deep Fake detection Tapas Sainisecurity-architecturesecurity-awarenessreverse-engineering+1
2023-08-06TalkC0c0n Dark web for investigations Amit Lokhandethreat-huntingdigital-forensicsnetwork-forensics+3
2022-09-24TalkC0c0n Introduction to RFID/NFC Hacking Davis Sojanembedded-securityfirmware-analysishardware-security+3
2022-09-24TalkC0c0n Raining CVEs on Wordpress plugins with Semgrep Shreya Pohekar, Syed Sheeraz Aliweb-securitystatic-analysissast+2
2022-09-24TalkC0c0n Cryptocurrency Forensics Bhushan Gulabrao Boraseforensicsdigital-forensicsblockchain-security+2
2022-09-23TalkC0c0n Hacking SmartContracts Anto Josephblockchain-securitysmart-contractsvulnerability-management+2
2022-09-23TalkC0c0n Pwning Android Apps at Scale Sparsh Kulshrestha, Shashank Barthwalandroid-securitymobile-securitymobile-pentesting+3
2022-09-23TalkC0c0n TropicTrooper : Targets high profile victims using newly discovered MQTT backdoor Saurabh Sharmareverse-engineeringvulnerability-managementpentesting
2022-09-23TalkC0c0n Ransomware: Prevention, Early Detection and Response Babitha Bpransomwareincident-responsevulnerability-management
2022-08-25TalkHitb Sec Conf Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle Presentation Rahul Sasi, Vishal Singhsocial-engineeringpentestingmalware+2
2022-08-10Tool demoBlackhat ParseAndC 2.0 – We Don’t Need No C Programs (for Parsing) Source Code Parbati Kumar Mannareverse-engineering
2022-05-18TalkCan Sec West Launching EMUX - A framework for emulating ARM and MIPS IoT Devices Presentation Source Code Saumil Shahfirmware-analysisreverse-engineeringembedded-security+1
2021-11-13TalkC0c0n Decoding new age hackers and Criminal Investigation Amit Dubeyincident-responsedigital-forensicsreverse-engineering
2021-11-13TalkC0c0n New way of looking at the hidden mysteries in the code Vandana Verma Sehgalcode-reviewstatic-analysisreverse-engineering+2
2021-11-13TalkC0c0n Machine learning to detect Chia mining Varun Kohlithreat-detectionthreat-huntingmalware-detection+2
2021-11-12TalkC0c0n Dissecting Malicious Software and Analysis Shrutirupa Banerjieemalwarereverse-engineeringdynamic-analysis+1
2021-11-11Tool demoBlackhat DejaVu ++ Source Code Bhadreshkumar Patel, Harish Ramadossmalwaredefense
2021-11-10Tool demoBlackhat RIoTPot: A Modular Hybrid-Interaction IoT/OT Honeypot Source Code Abhimanyu Rawat, Shreyas Srinivasamalwaredefense
2021-11-10Tool demoBlackhat Wireshark Forensics Toolkit Source Code Rishikesh Bhidemalwareforensic
2021-08-07TalkDefcon The Curious Case of Knowing the Unknown Video Vandana Verma Sehgalthreat-huntingthreat_modelingsecurity-architecture+2
2021-08-04Tool demoBlackhat ParseAndC: A Universal Parser and Data Visualization Tool for Security Testing Video Parbati Kumar Mannareverse-engineering
2020-11-20TalkDeepsec What’s Up Doc? - Self Learning Sandboxes to Defeat Modern Malwares Using RSA: Rapid Static Analysis Presentation Shyam Sundar Ramaswamimalware
2020-10-07TalkRootcon Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing Presentation Video Kaustubh Padwadiotredteampentest+1
2020-10-01Tool demoBlackhat Adhrit: Android Security Suite Source Code Abhishek Jm, Akhil Mahendraandroidcode-analysisreverse-engineering+2
2020-09-18TalkC0c0n Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux Munawwar Hussain Sheliareverse-engineeringiot
2020-08-09TalkDefcon Running an appsec program with open source projects Presentation Video Vandana Verma Sehgalowaspsecure-developmentdevsecops+3
2020-03-18TalkCan Sec West The ARM-X Firmware Emulation Framework Presentation Source Code Saumil Shahredteamarmfirmware+5
2020-03-06Tool demoNullcon FRISPY Source Code Tejas Girme, Parmanand Mishraspywareredteam
2019-11-09TalkToor Con 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Jatin Katariareverse-engineeringhardware-reverse-engineeringvulnerability-management+3
2019-11-01TalkHackfest The Mechanics of Malware’s Darkside Presentation Video Yagnesh Waran Panalysismalware
2019-10-22TalkHacklu Intro to Dark Arts: Getting Started with CTFs Geethna T K, Shruti Dixit, Sowmya Potlurireverse-engineeringbinary-analysisexploitation+1
2019-10-12TalkTexas Cyber Summit HX-3012 PErfidious: Make PE Backdooring Great Again! Shreyans Doshireverse-engineeringmalwarebinary-analysis+3
2019-10-03TalkVirus Bulletin Curious tale of 8.t used by multiple campaigns against South Asia Niranjan Jayanandreverse-engineeringvulnerability-managementapt+1
2019-09-27TalkC0c0n RANSOMWARE - to pay or not to pay Seshaprakash Kusuma Sreenivasaransomwareincident-responserisk-management
2019-09-27TalkC0c0n autoSource an automated framework for Source Code Review Source Code Malkit Singhcode-reviewsecure-codingstatic-analysis+3
2019-08-09TalkDefcon 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Jatin Katariareverse-engineeringvulnerability-managementsecurity-architecture+2
2019-08-08TalkBlackhat 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Jatin Katariareverse-engineeringhardware/embedded
2019-08-08TalkDefcon Hacking ICS devices for Fun Penetration Testing of Vehicle Components Video Arun Maneautomotive-cybersecuritycan-busics-security+3
2018-10-15TalkHacklu Come to the dark side! We have radical insurance groups & ransomware Video Ankit Gangwalransomwarerisk-managementcyber-insurance+2
2018-10-10TalkBrucon Simplifying the art of instrumentation Krishnakant Patil, Rushikesh D Nandedkarreverse-engineeringstatic-analysisdynamic-analysis+2
2018-10-05TalkC0c0n SCANDA: To Unbosom Malware Behavior Rajesh Nikam, Parmanand Mishramalwarereverse-engineeringdynamic-analysis+2
2018-10-03Tool demoBlackhat Angad: A Malware Detection Framework Using Multi-Dimensional Visualization Presentation Source Code Ankur Tyagimalware
2017-10-05TalkVirus Bulletin The router of all evil: more than just default passwords and silly scripts Presentation Whitepaper Video Himanshu Anandvulnerability-managementreverse-engineeringpentesting+1
2017-09-21TalkApp Sec Usa Androsia: A tool for securing in memory sensitive data Video Samit Anwerandroid-securitymobile-securitystatic-analysis+1
2017-08-18TalkC0c0n Dynamic Binary Instrumentation Vivek Arora, Bhaskar Rastogidynamic-analysisreverse-engineeringbinary-analysis+1
2017-08-18TalkC0c0n Your friendly neighbourhood exploit Aseem Jakharexploitationpentestingreverse-engineering+1
2017-08-18TalkC0c0n Hunting Botnets with Analytics Shomiron Das Guptabotnetblueteam
2017-08-04TalkSha Attacking OpenSSL using Side-channel Attacks: The RSA case study Whitepaper Praveen Vadnalareverse-engineeringvulnerability-managementsecurity-architecture+1
2017-01-25TalkOwasp App Sec California DASTProxy: Don’t let your automated security testing program stall on crawlInstead focus on business context Presentation Video Kiran Shiralidynamic-analysisdastdevsecops+3
2016-11-06TalkGround Zero Summit Hacking The Droids Anto Josephandroid-securitymobile-securityreverse-engineering+3
2016-10-27TalkBrucon Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! Video Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patilmalwarereverse-engineering
2016-10-13TalkApp Sec Usa When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE Video Sumanth Naropanth, Kavya Racharlamobile-securityvulnerability-managementreverse-engineering+1
2016-10-05TalkVirus Bulletin One-Click Fileless Infection Presentation Whitepaper Video Himanshu Anandreverse-engineeringincident-responsevulnerability-management
2016-08-07TalkDefcon Cyber Grand Shellphish Video Aravind Machiryautomated-exploit-detectionreverse-engineeringvulnerability-assessment+1
2016-08-05TalkDefcon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Jatin Katariareverse-engineeringhardware-reverse-engineeringfirmware-analysis+3
2016-06-18TalkRecon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Presentation Video Jatin Katariareverse-engineeringhardware-reverse-engineeringfirmware-analysis+3
2016-05-26TalkHitb Sec Conf HITB Lab: Mobile Application Security for iOS and Android Source Code Tushar Dalvimobileandroidios+3
2016-03-15TalkGroundzerosummit r00tKidz and Hacking Triveni Singhpentestingethical-hackingprivilege-escalation+3
2016-03-11TalkNullcon Physical Lock Security Amey Gat, Swapnil Wadwalkarpentestingreverse-engineeringvulnerability-management+1
2015-11-05TalkGround Zero Summit Exposing Cyber Espionage: Hello from Pakistan- IIC Session Jiten Jainincident-responsereverse-engineeringpentesting
2015-11-05TalkGround Zero Summit Browser based Malware attacks Harsh Daftarymalwarewebredteam
2015-11-05TalkGround Zero Summit Dissecting Android Malware Anto Josephmobileandroidmalware
2015-08-07TalkDefcon Getting into the Trust Store We Trust Ajit Hattireverse-engineeringsecurity-architecturevulnerability-management
2015-08-01TalkC0c0n Reversing and Deciphering the Cyber Espionage Malware Communications Monnappa K Areverse-engineeringdecipher
2015-03-15TalkHitb Sec Conf Sniffing the Airwaves with RTLSDR Presentation Yashin Mehaboobenetwork-pentestingpacket-analysisnetwork-monitoring+2
2015-01-27TalkOwasp App Sec California Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwatereverse-engineeringvulnerability-managementincident-response+1
2014-10-16TalkGrrcon Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design Aditya K Soodredteamreverse-engineeringblueteam+1
2014-09-26TalkVirus Bulletin Evolution of Android exploits from a static analysis tools perspective Presentation Whitepaper Video Jagadeesh Chandraiahandroid-securitystatic-analysisvulnerability-management+2
2014-09-18TalkApp Sec Usa Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwatereverse-engineeringmemory-forensicsincident-response+1
2014-08-06TalkBlackhat What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels! Presentation Whitepaper Video Aditya K Soodbotnetredteamblueteam+1
2014-05-29TalkHitb Sec Conf Hacking Your Cable TV Network: Die Hard Style Presentation Rahul Sasinetworkredteamiptv+1
2014-05-21TalkPhdays Android Exploitation Video Aditya Guptamobileandroidredteam+3
2014-03-15TalkBlackhat Anatomy of a Credit Card Stealing POS Malware Presentation Video Amol Sarwatereverse-engineeringpentestingvulnerability-management
2014-01-28TalkOwasp App Sec California Application Sandboxes: Know thy limits Video Rahul Kashyapapplication-pentestingreverse-engineeringvulnerability-management+1
2013-11-21TalkDeepsec Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy Video Parth Shuklabotnettelnet
2013-10-19TalkToor Con Static Malware Analysis with PyTriage Yashin Mehaboobemalware
2013-09-27TalkC0c0n ARM, Thumb and the Finger Aseem Jakharreverse-engineeringbinary-analysisassembly-analysis+2
2013-09-27TalkC0c0n Sandy - The Malicious Analysis Whitepaper Source Code Rahul Sasireverse-engineeringstatic-analysisdynamic-analysis
2013-08-01Tool demoBlackhat XENOTIX xBOT Source Code Ajin Abrahambotnetlinuxwindows+3
2012-11-23TalkMalcon Surprise paper! Atul Alexmalwarereverse-engineeringmobile-security
2012-11-23TalkMalcon Advanced Malware Engine Whitepaper Mohit Kumarmalwareandroidmobile+1
2012-11-23TalkMalcon Windows Phone 8 Malware Prototype Shantanu Gawdewindows-phoneredteammalware
2012-10-25TalkApp Sec Usa Cracking the Code of Mobile Application Video Sreenarayan Ashokkumarmobile-securityreverse-engineeringmobile-pentesting+3
2012-10-23TalkHacklu Buster: Android Security Buster Atul Alexandroid-securitymobile-securityreverse-engineering+1
2012-09-28TalkNullcon Attacking Angry Droids Aditya Gupta, Subho Halderandroid-securitymobile-securityreverse-engineering+2
2012-09-28TalkNullcon Alert(/xss/) - How to catch an XSS before someone exploits / reports it? Ahamed Nafeezweb-securityxsssecure-coding+2
2012-09-27TalkGrrcon Reversing Patches for Exploit Creation, Pen-Testing or Just Fun! Bharat Jogipentestredteamblueteam+2
2012-09-27TalkGrrcon The Realm of Third Generation Botnet Attacks Video Aditya K Soodredteambotnetweb+1
2012-08-03TalkC0c0n Cracking the Mobile Application Source Code Presentation Sreenarayan Ashokkumarmobileandroidios+3
2012-08-03TalkC0c0n I haz you and pwn your maal Presentation Harsimran Singh Waliaandroidmobilereverse-engineering+1
2012-08-03TalkC0c0n Cyber Weapons Sameer Saxenapentestingexploitationmalware+1
2012-07-28TalkDefcon Botnets Die Hard - Owned and Operated Presentation Video Aditya K Soodbotnetblueteam
2012-07-22Tool demoBlackhat Kautilya and Nishang Source Code Nikhil Mittalpost-exploitationethical-hackingpentesting+2
2012-07-14TalkHope Advancements in Botnet Attacks and Malware Distribution Video Aditya K Soodmalwarebotnetweb-security+2
2012-02-15TalkNullcon Binary God Presentation Video Atul Alexredteamemulatorassembler+2
2012-02-15TalkNullcon Sandboxing The deep truth Video Disha Agarwal, Manish Palifuzzingsandboxblueteam
2011-12-04TalkClubhack Exploit the Exploit Kits Presentation Dhruv Soiredteamnetworkexploit-kit
2011-11-25TalkMalcon Advanced Malware for Apple Products Atul Alexmalwareredteamapple+2
2011-11-25TalkMalcon Mareech : Look it’s a HID made up of gold Nikhil Mittalhidredteammalware
2011-11-17TalkDeepsec FakeAntiVirus - Journey from Trojan to a Persisent Threat Jagadeesh Chandraiahmalwaretrojanreverse-engineering+1
2011-09-19TalkBrucon Botnets and Browsers, Brothers in a Ghost Shell Presentation Aditya K Soodbotnetwebredteam
2011-09-07TalkSecuritybyte Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit Presentation Vivek Ramachandranwifiwormbotnet+1
2011-08-03TalkBlackhat Reverse Engineering Browser Components: Dissecting and Hacking Silverlight, HTML 5 and Flex Presentation Whitepaper Video Shreeraj Shahreverse-engineeringwebajax+6
2011-05-19TalkHitb Sec Conf Spying on SpyEye – What Lies Beneath? Presentation Aditya K Soodwebmalwarebrowser+2
2011-02-25TalkNullcon Reversing microsoft patches to reveal vulnerable code Presentation Whitepaper Harsimran Singh Waliareverse-engineering
2011-02-25TalkNullcon Jugaad Beta: Linux Thread Injection malware PoC Source Code Aseem Jakharlinuxmalwareredteam
2011-02-15TalkNullcon Botnet Detection approach by DNS behavior and clustering analysis Presentation Nilesh Sharma, Pulkit Mehndirattabotnetanalysisdns+1
2010-10-29TalkT2 Hacking Femtocells Ravishankar Borgaonkarmobile-securityreverse-engineeringvulnerability-management
2010-08-01TalkC0c0n Horses, Rats and Bots Jairam Rameshmalwarebotnetreverse-engineering+1
2010-06-18TalkSyscan REVERSE ENGINEERING WEB 2.0 APPLICATIONS Shreeraj Shahreverse-engineeringwebajax+6
2010-02-25TalkNullcon Malware Detection Tool for Websites: A Proof-Of-Concept Presentation Anant Kochharmalwarewebblueteam
2010-02-25TalkNullcon Botnet mitigation, monitoring and management. Presentation Harshad Patilbotnetblueteaminfrastructure
2009-11-18TalkSecuritybyte Rumbling Infections – Web Malware Ontology Presentation Aditya K Soodwebmalware
2009-08-01TalkDefcon The Making of the second SQL injection Worm Presentation Source Code Video Sumit Siddharthsqlsqliweb+2
2008-12-06TalkClubhack Reverse Engineering for exploit writers Presentation Nibin Vargheseredteamreverse-engineeringexploit-development
2008-12-06TalkClubhack Reverse Engineering v/s Secure Coding Presentation Atul Alexsecure-codingreverse-engineeringredteam+2
2006-09-21TalkHitb Sec Conf Finding Secrets in ISAPI Presentation Nish Bhallasecure-codingreverse-engineering
2005-10-18TalkBlackhat Adware/Spyware Presentation Saumil Shahblueteamadwarespyware