hitbsecconf2013kul
D1 KEYNOTE - Andy Ellis - Cognitive Injection.pdf
2014-06-19 23:46
4.2M
D1T1 - Collin Mulliner - Android DDI - Dynamic Dalvik Instrumentation of Android Applications.pdf
854K
D1T1 - Dominic Chell and Shaun Colley - Practical Attacks Against Encrypted VoIP Communications.pdf
4.9M
D1T1 - Gianni Gnesa - Hacking Corporations Using Unconventional Chained Exploits.pdf
54M
D1T1 - Kallenberg, Kovah, Butterworth - Defeating Signed BIOS Enforcement.pdf
1.3M
D1T1 - Marco Balduzzi, Kyle Wilhoit Alessandro Pasta - Attacking Vessel Tracking Systems for Fun and Profit.pdf
9.0M
D1T1 - Peter 'bl4sty' Geissler - Demystifying Game Console Security.pdf
20M
D1T2 - Adam Laurie - RFIDler - Software Defined RFID Reader Writer Emulator.pdf
5.7M
D1T2 - Andy Davis - Deriving Intelligence from USB Stack Interactions.pdf
1.4M
D1T2 - Francisco - Owning a Cisco VoIP Environment.pdf
D1T2 - Joaquim Espinhara and Ulisses Alburquerque - Using Online Activity as Digital DNA.pdf
9.9M
D1T2 - Mariano Graziano and Andrea Lanzi - How Actaeon Unveils Your Hypervisor.pdf
1.0M
D1T2 - Mathias Morbitzer - TCP Idle Scans in IPv6.pdf
8.0M
D1T3 - Cem Gurkok - Hunting for OS X Rootkits in Memory.pdf
7.8M
D1T3 - Mike Shema - CSRF Lab.pdf
2.9M
D1T3 - Wes Brown - Malware Analysis Using Visualization.pdf
2.4M
D1T3 BONUS TALK - Marc Rogers - Why I Hacked TouchID and Still Think It's Awesome.pdf
D2 KEYNOTE - Joe Sullivan - Bringing Social to Security - NO SLIDES.pdf
0
D2T1 - Cyril 'pod2g' Cattiaux and GG - How Apple Can Read Your iMessages.pdf
7.6M
D2T1 - Hugo Teso - Digging Deeper Into Aviation Security.pdf
17M
D2T1 - James Forshaw - Exploiting XML Digital Signature Implementations.pdf
1.7M
D2T1 - Joshua 'p0sixninja' Hill - SHAttered Dreams.pdf
2.1M
D2T1 - Mark Vincent Yason - Diving Into IE10's Enhanced Protected Mode Sandbox.pdf
D2T2 - Rahul Sasi - Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis.pdf
2.6M
D2T2 - Stefan Esser - Tales from iOS 6 Exploitation and iOS 7 Security Changes.pdf
D2T2 - Stefano Zanero - Tracking and Characterizing Botnets Using Automatically Generated Domains.pdf
D2T2 - Victor van der Veen - A Fast and Complete Android Method Tracer.pdf
1.6M
D2T2 - Vladimir Katalov - Cracking and Analyzing Apple's iCloud Protocol.pdf
D2T3 - Ashar Javad - Trusted Friend Attack.pdf
15M
D2T3 - Eric Michaud and Ryan Lackey - Thwarting Evil Maid Attacks.pdf
6.9M
D2T3 - Job de Haas - 20 Ways Past Secure Boot.pdf
1.8M
D2T3 - Keith Lee and Jonathan Werrett - Facebook OSINT.pdf
5.2M
D2T3 - Luiz Eduardo and Joaquim Espinhara - Lost in Translation.pdf
16M