Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.
| Date | Type | Conference | Title | Speaker(s) | Tags |
|---|---|---|---|---|---|
| 2013-07-31 | Talk | Blackhat |
Clickjacking revisited: A perceptual view of UI security
| Devdatta Akhawe | clickjackingblueteamredteam |
| 2013-03-14 | Talk | Blackhat |
Lets play - Applanting
| Ajit Hatti | mobileredteamcsrf+2 |
| 2012-07-26 | Talk | Blackhat |
HTML5 top 10 threats β Stealth Attack and Silent Exploits
| Shreeraj Shah | redteamcorscsrf+3 |
| 2012-03-14 | Talk | Blackhat |
HTML5 top 10 threats β Stealth Attack and Silent Exploits
| Shreeraj Shah | redteamcorscsrf+3 |
| 2011-05-20 | Talk | Hitb Sec Conf |
Next Generation Web Attacks β HTML 5, DOM(L3) and XHR(L2)
| Shreeraj Shah | redteamcorscsrf+3 |
| 2010-07-01 | Talk | Hitb Sec Conf |
Top 10 Web 2.0 Attacks and Exploits
| Shreeraj Shah | redteamcorscsrf+3 |