- hitbsecconf2013 ams -
D1-LAB-Sniffing-the-Airwaves-with-RTL-SDR.pdf
2017-10-14 21:57
5.9M
D1T1-Compromise-as-a-Service-Our-PleAZURE.pdf
2017-10-14 21:57
7.8M
D1T1-Hacking-Your-Cable-TV-Network-Die-Hard-Style.pdf
2017-10-14 21:57
37M
D1T2-REboot-Bootkits-Revisited.pdf
2017-10-14 21:57
903K
D1T2-State-of-the-Art-Exploring-the-New-Android-KitKat-Runtime.pdf
2017-10-14 21:57
627K
D2-LAB-Attack-Surface-Intelligence-of-Source-Code.pdf
2017-10-14 21:57
12M
D2T1-Alices-Adventures-in-Smart-Building-Land.pdf
2017-10-14 21:57
6.9M
D2T1-Exploiting-Passbook-to-Fly-for-Free.pdf
2017-10-14 21:57
19M
D2T1-G-Jacking-AppEngine-based-Applications.pdf
2017-10-14 21:57
766K
D2T1-GRX-and-a-Spy-Agency.pdf
2017-10-14 21:57
7.3M
D2T1-Why-Port-Scans-are-for-Pussies.pdf
2017-10-14 21:57
2.2M
D2T2-Breaking-Cloud-Isolation.pdf
2017-10-14 21:57
1.0M
D2T2-Exploring-and-Exploiting-iOS-Web-Browsers.pdf
2017-10-14 21:57
2.7M
D2T2-The-InSecurity-of-Pull-Printing-Solutions.pdf
2017-10-14 21:57
4.0M
D2T3-Format-Reverser-of-Data-Objects.pdf
2017-10-14 21:57
22M
D2T3-Using-Javascript-Security-Features-to-Kill-Itself.pdf
2017-10-14 21:57
1.9M