39:57 OrKatz Getting New Actionable Insights by Analyzing Web Application Firewall Triggers All Hacking Cons
42:16 Alvaro Muoz Automatic Detection of Inadequate Authorization Checks in Web Applications All Hacking Cons
42:22 Paolo Di Prodi Tim Burrell Monitoring Web Sites for Malware Injection with Web Detector All Hacking Cons
49:32 Steven Murdoch Keynote Anonymous Communications and Tor History and Future Challenges All Hacking Cons
45:18 Winston Bond OWASP Mobile Top Ten 2014 The New Lack of Binary Protection Category All Hacking Cons
41:17 John Dickson Can Application Security Training Make Developers Build Less Vulnerable Code All Hacking Cons
43:39 Jacob West Keynote Fighting Next Generation Adversaries with Shared Threat Intelligence All Hacking Cons
40:10 Tin Zaw Scott Matsumoto Threat Modeling A Brief History and the Unified Approach at Intuit All Hacking Cons
58:40 Krzysztof Kotowicz Biting into the Forbidden Fruit Lessons from Trusting JavaScript Crypto All Hacking Cons
30:25 Mark Denihan Sean Duggan OWASP Security Shepherd Mobile Web Security Awareness and Education All Hacking Cons
48:50 Dan Cornell Hybrid Analysis Mapping Making Security and Development Tools Play Nice Together All Hacking Cons
47:08 Lorenzo Cavallaro Keynote Copper Droid On the Reconstruction of Android Malware Behaviors All Hacking Cons
46:59 Sebastian Lekies Martin Johns Relax everybody HTML5 is much securer than you think All Hacking Cons
51:04 Seba Deleersnyder Bart De Win OpenSAMM Best Practices Lessons from the Trenches All Hacking Cons