filmov
tv
RuhrSec 2016: 'Hacking with Unicode in 2016', Mathias Bynens

Показать описание
RuhrSec is the annual English speaking non-profit IT security conference with cutting-edge security talks by renowned experts. RuhrSec is organized by Hackmanit.
🔽 More information ...
Abstract. This presentation explores common mistakes made by programmers whendealing with Unicode support and character encodings on the Web. Foreach mistake, I explain how to fix/prevent it, but also how it couldpossibly be exploited.
Biography. Mathias is a Belgian web standards freak. He likes HTML, CSS, JavaScript, Unicode, performance, and security. At Opera Software he’s a member of the Developer Relations team.
Speaker: Mathias Bynens
———
👉 Subscribe to our channel:
👉 Read more about interesting IT Security topics on our blog:
✍️ Want a deeper dive?
Training courses in Single Sign-On (SAML, OAuth and OpenID Connect), Secure Web Development, TLS and Web Services are available here:
———
———
Thanks for your attention and support. Stay secure.
#cybersecurity #hackingunicode #ruhrsec #cyber #conference
#itsecurity #itsicherheit #hack #hacking #unicode #talk
🔽 More information ...
Abstract. This presentation explores common mistakes made by programmers whendealing with Unicode support and character encodings on the Web. Foreach mistake, I explain how to fix/prevent it, but also how it couldpossibly be exploited.
Biography. Mathias is a Belgian web standards freak. He likes HTML, CSS, JavaScript, Unicode, performance, and security. At Opera Software he’s a member of the Developer Relations team.
Speaker: Mathias Bynens
———
👉 Subscribe to our channel:
👉 Read more about interesting IT Security topics on our blog:
✍️ Want a deeper dive?
Training courses in Single Sign-On (SAML, OAuth and OpenID Connect), Secure Web Development, TLS and Web Services are available here:
———
———
Thanks for your attention and support. Stay secure.
#cybersecurity #hackingunicode #ruhrsec #cyber #conference
#itsecurity #itsicherheit #hack #hacking #unicode #talk
RuhrSec 2016: 'Hacking with Unicode in 2016', Mathias Bynens
RuhrSec 2016: 'An Abusive Relationship with AngularJS v2', Mario Heiderich
RuhrSec 2016: 'On Securing Legacy Software Against Code-Reuse Attacks', Lucas Vincenzo Dav...
RuhrSec 2016: 'The DROWN Attack', Sebastian Schinzel
CTF Walkthrough: CTF-101 by Snyk, Bypassing Python Unicode Parsing
Unicode ZERO WIDTH Spaces to HIDE SECRET MESSAGES (MITRE CTF)
Drawing Line Breaks in the Linux Shell Part 2 Special Charactors Unicode
Timwi vs sergio
Exploiting en 32x by UND3R - Cap 5 - Unicode
Pair Programming - Whats up with this zero-width-space hack?
RuhrSec 2017: 'A new categorization system for Side-channel attacks on mo...', Dr. Veelash...
Browsers Gone Wild
#HITB2016AMS D2T1 - Cache Side Channel Attacks: CPU Design As A Security Problem - Anders Fogh
Cross-Site Scripting Attacks (XSS) - Secure Digital Life #93
Hertzian Tales: Adventures in 'Useless' Hacking
Do you like fuzzing? - Abhijeth, Bugcrowd's LevelUp 2017
#HITB2018AMS D2T2 - Exposing Hidden Exploitable Behaviors Using EDF - Fernando Arnaboldi
CONFidence 2018: XSS in Google's application and bypassing CSP (Michał Bentkowski)
#HITB2016AMS D2T1 - Cache Side Channel Attacks CPU Design As A Security Problem - Anders Fogh.mp4
r2con2018 - Fuzzing with Erlamsa - by dark_key
Cache Side Channel Attack: Exploitability and Countermeasures
nullcon Goa 2015: ECMA Script 6 from an Attacker's Perspective by Mario Heiderich
Kod.io 2014 - 10 Things I Didn't Know About HTML by Mathias Bynens
BlueHat IL 2019 - Lucas Leong - Make Static Instrumentation Great Again
Комментарии