Sogeti

Results: 143



#Item
31Software / Computer programming / Debuggers / Profilers / Valgrind / Symbolic execution / Programming tool / Software testing

Fuzzgrind: an automatic fuzzing tool

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
32Computing / Software / BIOS / Computer architecture / Cyberwarfare / Rootkit / Firmware / Broadcom / Booting

How to develop a rootkit for Broadcom NetExtreme network cards Guillaume Delugr´e Sogeti / ESEC R&D guillaume(at)security-labs.org

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
33Software testing / Computing / Software / Mobile application testing / International Software Testing Qualifications Board / Software Quality Systems AG / Sogeti / Mobile application development / Test automation / Mobile testing / Professional certification / Mobile app

Mobile CMAP Mobile App Testing – Foundation Level Apps and mobiles have become an important element of today’s IT and society in a very short time frame. Mobile technologies are fast changing and have a huge impact

Add to Reading List

Source URL: www.isqi.org

Language: English - Date: 2016-02-02 09:07:21
34

De l’invisibilit´ e des rootkits : application sous Linux ´ Eric Lacombe1 , Fr´ed´eric Raynal2 , and Vincent Nicomette3 1

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: French - Date: 2016-07-01 12:08:46
    35

    Déprotection semi-automatique de binaire Yoann Guillot & Alexandre Gazet Sogeti - ESEC Résumé Que ce soit sur des binaires malicieux ou non, les protections dont le but est de freiner la rétro-ingénierie sont d’un

    Add to Reading List

    Source URL: esec-lab.sogeti.com

    Language: French - Date: 2016-07-01 12:08:46
      36Smartphones / IOS / IPhone / ITunes / Keychain / IPSW

      iPhone data protection in depth Jean-Baptiste B´edrune Jean Sigwald Sogeti / ESEC jean-baptiste.bedrune(at)sogeti.com

      Add to Reading List

      Source URL: esec-lab.sogeti.com

      Language: English - Date: 2016-07-01 12:08:46
      37Programming language implementation / Executable / Disassembler / Linker / Relocation / Compiler / Machine code / Metasploit Project

      Metasm a ruby (dis)assembler Yoann Guillot 20 october 2007

      Add to Reading List

      Source URL: esec-lab.sogeti.com

      Language: English - Date: 2016-07-01 12:08:46
      38Logarithms / K2 / Joux / K1

      Attacks in the multi-user setting: Discrete logarithm, Even-Mansour and PRINCE Pierre-Alain Fouque1 , Antoine Joux2 , Chrysanthi Mavromati3 2

      Add to Reading List

      Source URL: esec-lab.sogeti.com

      Language: English - Date: 2016-07-01 12:08:46
      39

      Introduction Architecture et ´ elaboration d’un rootkit Exemple de construction d’un rootkit “furtif” Conclusion

      Add to Reading List

      Source URL: esec-lab.sogeti.com

      Language: French - Date: 2016-07-01 12:08:46
        40Computer networking / Internet privacy / Network performance / Proxy server / Transmission Control Protocol

        Presentation Introduction Overview and first clues Protocol analysis Short security analysis

        Add to Reading List

        Source URL: esec-lab.sogeti.com

        Language: English - Date: 2016-07-01 12:08:46
        UPDATE