| D1T1 - A Journey Into the Secret Flaws of In-DRAM RowHammer Mitigations - Emanuele Vannacci & Pietro Frigo.pdf | 2020-07-28 19:58 | 2.8M | |
| D1T1 - Breakout Script of the Westworld - Tianwen Tang & Wei Xiao.pdf | 2020-07-27 18:21 | 2.0M | |
| D1T1 - Clandestine Hunter - Two Strategies for Supply Chain Attack - Byeongjae Kim & Taewoo Lee.pdf | 2020-08-06 02:17 | 3.1M | |
| D1T1 - FIDLing with Decompilers - Carlos Garcia Prado & Ryan Warns.pdf | 2020-07-25 23:28 | 63M | |
| D1T1 - The Dojo of Blue - How Adversary Emulator Can Enhance Blue Team Performance - SHANG-DE Jiang.pdf | 2020-08-04 07:51 | 2.2M | |
| D1T1 - The Secret Codes Tell the Secrets - Zhang Qing & BaiGuang Dong.pdf | 2020-07-26 08:14 | 42M | |
| D1T1 - Zen - A Complex Campaign of Harmful Android Apps - Łukasz Siewierski.pdf | 2020-07-27 18:23 | 3.8M | |
| D1T2 - A DECEPTICON and AUTOBOT Walk Into a Bar- Python for Enhanced OPSEC - Joe Gray.pdf | 2020-07-25 09:32 | 6.7M | |
| D1T2 - Kernel Hijacking Is Not an Option - MemoryRanger Comes to the Rescue Again - Igor Korkin.pdf | 2020-08-02 19:22 | 2.4M | |
| D1T2 - Operation SemiChimera - APT Operation Targets Semiconductor Vendors - Bletchley Chen, Inndy Lin & SHANG-DE Jiang.pdf | 2020-08-02 19:17 | 5.3M | |
| D1 VIRTUAL LAB - Qiling Framework - Kaijern Lau.pdf | 2020-07-25 04:13 | 8.3M | |
| D1 VIRTUAL LAB - Signal Processing & GNU Radio - Ateet Kumar.pdf | 2020-07-27 18:21 | 2.2M | |
| D2T1 - Exploring Deficiencies in the State-of-the-art Automatic Software Vulnerability Mining Technologies - Wish Wu.pdf | 2020-07-26 08:09 | 35M | |
| D2T1 - Public and Private, Common Flaws in ICS Network Protocols - Mars Cheng & Selmon Yang.pdf | 2020-08-06 02:10 | 8.1M | |
| D2T1 - SAP RCE - The Agent Who Spoke Too Much - Yvan Genuer.pdf | 2020-07-26 08:09 | 3.6M | |
| D2T1 - The Weakest Element of Acquiring Bank Infrastructure - Ilia Bulatov & Gleb Cherbov.pdf | 2020-07-26 08:09 | 3.5M | |
| D2T2 - Quark Engine - An Obfuscation-Neglect Android Malware Scoring System - JunWei Song, KunYu Chen, IokJin Sih, AnWei Kung & Chung Hsin Chen.pdf | 2020-07-26 09:38 | 3.2M | |
| D2T2 - The Fragile Art of Edge Computing- Walk through Access Control Systems - Philippe Lin, Roel Reyes, Joey Costoya, Vincenzo Ciancaglini & Morton Swimmer.pdf | 2020-08-06 02:11 | 3.7M | |
| KEYNOTE 2 - DevSecOps, Chaos Security, and Not Being Left Behind - Eddie Schwartz.pdf | 2020-07-26 08:19 | 8.7M | |