Sogeti

Results: 143



#Item
1Discovering a botnet from Russia (With love) Damien Aumaitre -  Christophe Devaux -  Julien Lenoir -   Sogeti/ESEC

Discovering a botnet from Russia (With love) Damien Aumaitre - Christophe Devaux - Julien Lenoir - Sogeti/ESEC

Add to Reading List

Source URL: esec-lab.sogeti.com

- Date: 2016-07-01 12:08:46
    2iPhone security model & vulnerabilities  Cedric Halbronn Jean Sigwald  Sogeti / ESEC

    iPhone security model & vulnerabilities Cedric Halbronn Jean Sigwald Sogeti / ESEC

    Add to Reading List

    Source URL: esec-lab.sogeti.com

    - Date: 2016-07-01 12:08:46
      3Metasm Manipulation structurelle Challenge T2 2007 Conclusion  D´eprotection semi-automatique de binaire

      Metasm Manipulation structurelle Challenge T2 2007 Conclusion D´eprotection semi-automatique de binaire

      Add to Reading List

      Source URL: esec-lab.sogeti.com

      - Date: 2016-07-01 12:08:46
        4Whistling over the wire Arnauld Mascret Presentation Architecture Planning the attack

        Whistling over the wire Arnauld Mascret Presentation Architecture Planning the attack

        Add to Reading List

        Source URL: esec-lab.sogeti.com

        - Date: 2016-07-01 12:08:46
          5Deception 2.0 Social networks for information operations Christophe DEVAUX christophe.devaux(at)sogeti.com Arnauld MASCRET

          Deception 2.0 Social networks for information operations Christophe DEVAUX christophe.devaux(at)sogeti.com Arnauld MASCRET

          Add to Reading List

          Source URL: esec-lab.sogeti.com

          - Date: 2016-07-01 12:08:46
            6PDF pour les nuls (en 1 slide) Le PDF, c’est dynamique ! Adobe et PDF Les origamis contre-attaquent : fuite de credentials  Les origamis malicieux en PDF contre-attaquent

            PDF pour les nuls (en 1 slide) Le PDF, c’est dynamique ! Adobe et PDF Les origamis contre-attaquent : fuite de credentials Les origamis malicieux en PDF contre-attaquent

            Add to Reading List

            Source URL: esec-lab.sogeti.com

            - Date: 2016-07-01 12:08:46
              7Metasm Feelings  Alexandre Gazet Yoann Guillot

              Metasm Feelings Alexandre Gazet Yoann Guillot

              Add to Reading List

              Source URL: esec-lab.sogeti.com

              - Date: 2016-07-01 12:08:46
                8D´ esobfuscation automatique de binaire - The Barbarian Sublimation Yoann Guillot, Alexandre Gazet Sogeti - ESEC

                D´ esobfuscation automatique de binaire - The Barbarian Sublimation Yoann Guillot, Alexandre Gazet Sogeti - ESEC

                Add to Reading List

                Source URL: esec-lab.sogeti.com

                - Date: 2016-07-01 12:08:46
                  9Closer to metal: Reverse engineering the Broadcom NetExtreme’s firmware Guillaume Delugr´e Sogeti / ESEC R&D guillaume(at)security-labs.org

                  Closer to metal: Reverse engineering the Broadcom NetExtreme’s firmware Guillaume Delugr´e Sogeti / ESEC R&D guillaume(at)security-labs.org

                  Add to Reading List

                  Source URL: esec-lab.sogeti.com

                  - Date: 2016-07-01 12:08:46
                    10Introduction Rootkit for Firefox Rootkit for Internet Explorer Browser Rootkits Christophe Devaux -

                    Introduction Rootkit for Firefox Rootkit for Internet Explorer Browser Rootkits Christophe Devaux -

                    Add to Reading List

                    Source URL: esec-lab.sogeti.com

                    - Date: 2016-07-01 12:08:46