- hitbsecconf2013 ams -

 

[   ]D1-LAB-Sniffing-the-Airwaves-with-RTL-SDR.pdf2017-10-14 21:575.9M 
[   ]D1T1-Compromise-as-a-Service-Our-PleAZURE.pdf2017-10-14 21:577.8M 
[   ]D1T1-Hacking-Your-Cable-TV-Network-Die-Hard-Style.pdf2017-10-14 21:5737M 
[   ]D1T2-REboot-Bootkits-Revisited.pdf2017-10-14 21:57903K 
[   ]D1T2-State-of-the-Art-Exploring-the-New-Android-KitKat-Runtime.pdf2017-10-14 21:57627K 
[   ]D2-LAB-Attack-Surface-Intelligence-of-Source-Code.pdf2017-10-14 21:5712M 
[   ]D2T1-Alices-Adventures-in-Smart-Building-Land.pdf2017-10-14 21:576.9M 
[   ]D2T1-Exploiting-Passbook-to-Fly-for-Free.pdf2017-10-14 21:5719M 
[   ]D2T1-G-Jacking-AppEngine-based-Applications.pdf2017-10-14 21:57766K 
[   ]D2T1-GRX-and-a-Spy-Agency.pdf2017-10-14 21:577.3M 
[   ]D2T1-Why-Port-Scans-are-for-Pussies.pdf2017-10-14 21:572.2M 
[   ]D2T2-Breaking-Cloud-Isolation.pdf2017-10-14 21:571.0M 
[   ]D2T2-Exploring-and-Exploiting-iOS-Web-Browsers.pdf2017-10-14 21:572.7M 
[   ]D2T2-The-InSecurity-of-Pull-Printing-Solutions.pdf2017-10-14 21:574.0M 
[   ]D2T3-Format-Reverser-of-Data-Objects.pdf2017-10-14 21:5722M 
[   ]D2T3-Using-Javascript-Security-Features-to-Kill-Itself.pdf2017-10-14 21:571.9M