×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
jonathan-brossard documents
Investor Relations
[HITB Malaysia 2011] Exploit Automation
Technology
[Kiwicon 2011] Post Memory Corruption Memory Analysis
Technology
[Blackhat US 2011] Post Memory Corruption Memory Analysis
Technology
[CCC-28c3] Post Memory Corruption Memory Analysis
Documents
[HackInTheBox] Breaking virtualization by any means
Documents
[Telecomix] Zero crypto attacks against preboot authentication passwords
Technology
[Ruxcon Monthly Sydney 2011] Proprietary Protocols Reverse Engineering : Research leads
Technology
[Syscan360 2013] Brossard Jonathan
Technology
[Defcon] Hardware backdooring is practical
Documents
Hardware backdooring is practical
Documents
[2013 syscan360] Jonathan Brossard_katsuni理论介绍以及在沙盒和软件仿真方面的应用
Technology
[Hackito2012] Hardware backdooring is practical
Technology
[Ruxcon 2011] Post Memory Corruption Memory Analysis
Documents
[DEFCON] Bypassing preboot authentication passwords by instrumenting the BIOS keyboard buffer
Documents
[DEFCON 16] Bypassing pre-boot authentication passwords by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
Documents
[HES 2010] Breaking Virtualization By Switching To Virtual 8086 Mode
Documents
[H2HC Sao Paulo 2009] PreBoot Authentication Password Cracking on a budget
Documents
[HITB Amsterdam 2010]Breaking Virtualization By Switching To Virtual 8086 Mode Final
Documents
[h2hc] Generic exploitation of invalid memory writes
Documents
[Ruxcon] Breaking virtualization by switching the cpu to virtual 8086 mode
Internet
[Blackhat2015] SMB : SHARING MORE THAN JUST YOUR FILES... #Whitepaper
Next >