hitblockdown002

[   ]D1T1 - A Journey Into the Secret Flaws of In-DRAM RowHammer Mitigations - Emanuele Vannacci & Pietro Frigo.pdf2020-07-28 19:582.8M 
[   ]D1T1 - Breakout Script of the Westworld - Tianwen Tang & Wei Xiao.pdf2020-07-27 18:212.0M 
[   ]D1T1 - Clandestine Hunter - Two Strategies for Supply Chain Attack - Byeongjae Kim & Taewoo Lee.pdf2020-08-06 02:173.1M 
[   ]D1T1 - FIDLing with Decompilers - Carlos Garcia Prado & Ryan Warns.pdf2020-07-25 23:2863M 
[   ]D1T1 - The Dojo of Blue - How Adversary Emulator Can Enhance Blue Team Performance - SHANG-DE Jiang.pdf2020-08-04 07:512.2M 
[   ]D1T1 - The Secret Codes Tell the Secrets - Zhang Qing & BaiGuang Dong.pdf2020-07-26 08:1442M 
[   ]D1T1 - Zen - A Complex Campaign of Harmful Android Apps - Łukasz Siewierski.pdf2020-07-27 18:233.8M 
[   ]D1T2 - A DECEPTICON and AUTOBOT Walk Into a Bar- Python for Enhanced OPSEC - Joe Gray.pdf2020-07-25 09:326.7M 
[   ]D1T2 - Kernel Hijacking Is Not an Option - MemoryRanger Comes to the Rescue Again - Igor Korkin.pdf2020-08-02 19:222.4M 
[   ]D1T2 - Operation SemiChimera - APT Operation Targets Semiconductor Vendors - Bletchley Chen, Inndy Lin & SHANG-DE Jiang.pdf2020-08-02 19:175.3M 
[   ]D1 VIRTUAL LAB - Qiling Framework - Kaijern Lau.pdf2020-07-25 04:138.3M 
[   ]D1 VIRTUAL LAB - Signal Processing & GNU Radio - Ateet Kumar.pdf2020-07-27 18:212.2M 
[   ]D2T1 - Exploring Deficiencies in the State-of-the-art Automatic Software Vulnerability Mining Technologies - Wish Wu.pdf2020-07-26 08:0935M 
[   ]D2T1 - Public and Private, Common Flaws in ICS Network Protocols - Mars Cheng & Selmon Yang.pdf2020-08-06 02:108.1M 
[   ]D2T1 - SAP RCE - The Agent Who Spoke Too Much - Yvan Genuer.pdf2020-07-26 08:093.6M 
[   ]D2T1 - The Weakest Element of Acquiring Bank Infrastructure - Ilia Bulatov & Gleb Cherbov.pdf2020-07-26 08:093.5M 
[   ]D2T2 - Quark Engine - An Obfuscation-Neglect Android Malware Scoring System - JunWei Song, KunYu Chen, IokJin Sih, AnWei Kung & Chung Hsin Chen.pdf2020-07-26 09:383.2M 
[   ]D2T2 - The Fragile Art of Edge Computing- Walk through Access Control Systems - Philippe Lin, Roel Reyes, Joey Costoya, Vincenzo Ciancaglini & Morton Swimmer.pdf2020-08-06 02:113.7M 
[   ]KEYNOTE 2 - DevSecOps, Chaos Security, and Not Being Left Behind - Eddie Schwartz.pdf2020-07-26 08:198.7M