Attack-driven defense

Zane Lackey 10 years ago

PowerShell for Penetration Testers

Nikhil Mittal 11 years ago

ruxc0n 2012

mimeframe 11 years ago

Exploiting Firefox Extensions

Roberto Suggi Liverani 14 years ago

Application Security for RIAs

johnwilander 12 years ago

Same Origin Policy Weaknesses

kuza55 14 years ago

Rapid Threat Modeling : case study

Antonio Fontes 12 years ago

I thought you were my friend - Malicious Markup

Mario Heiderich 13 years ago

HTML5 - The Good, the Bad, the Ugly

Mario Heiderich 13 years ago

HTML5 Web Workers-unleashed

Peter Lubbers 13 years ago