hitbsecconf2013kul

 

[   ]

D1 KEYNOTE - Andy Ellis - Cognitive Injection.pdf

2014-06-19 23:46

4.2M

 

[   ]

D1T1 - Collin Mulliner - Android DDI - Dynamic Dalvik Instrumentation of Android Applications.pdf

2014-06-19 23:46

854K

 

[   ]

D1T1 - Dominic Chell and Shaun Colley - Practical Attacks Against Encrypted VoIP Communications.pdf

2014-06-19 23:46

4.9M

 

[   ]

D1T1 - Gianni Gnesa - Hacking Corporations Using Unconventional Chained Exploits.pdf

2014-06-19 23:46

54M

 

[   ]

D1T1 - Kallenberg, Kovah, Butterworth - Defeating Signed BIOS Enforcement.pdf

2014-06-19 23:46

1.3M

 

[   ]

D1T1 - Marco Balduzzi, Kyle Wilhoit Alessandro Pasta - Attacking Vessel Tracking Systems for Fun and Profit.pdf

2014-06-19 23:46

9.0M

 

[   ]

D1T1 - Peter 'bl4sty' Geissler - Demystifying Game Console Security.pdf

2014-06-19 23:46

20M

 

[   ]

D1T2 - Adam Laurie - RFIDler - Software Defined RFID Reader Writer Emulator.pdf

2014-06-19 23:46

5.7M

 

[   ]

D1T2 - Andy Davis - Deriving Intelligence from USB Stack Interactions.pdf

2014-06-19 23:46

1.4M

 

[   ]

D1T2 - Francisco - Owning a Cisco VoIP Environment.pdf

2014-06-19 23:46

1.3M

 

[   ]

D1T2 - Joaquim Espinhara and Ulisses Alburquerque - Using Online Activity as Digital DNA.pdf

2014-06-19 23:46

9.9M

 

[   ]

D1T2 - Mariano Graziano and Andrea Lanzi - How Actaeon Unveils Your Hypervisor.pdf

2014-06-19 23:46

1.0M

 

[   ]

D1T2 - Mathias Morbitzer - TCP Idle Scans in IPv6.pdf

2014-06-19 23:46

8.0M

 

[   ]

D1T3 - Cem Gurkok - Hunting for OS X Rootkits in Memory.pdf

2014-06-19 23:46

7.8M

 

[   ]

D1T3 - Mike Shema - CSRF Lab.pdf

2014-06-19 23:46

2.9M

 

[   ]

D1T3 - Wes Brown - Malware Analysis Using Visualization.pdf

2014-06-19 23:46

2.4M

 

[   ]

D1T3 BONUS TALK - Marc Rogers - Why I Hacked TouchID and Still Think It's Awesome.pdf

2014-06-19 23:46

9.9M

 

[   ]

D2 KEYNOTE - Joe Sullivan - Bringing Social to Security - NO SLIDES.pdf

2014-06-19 23:46

0

 

[   ]

D2T1 - Cyril 'pod2g' Cattiaux and GG - How Apple Can Read Your iMessages.pdf

2014-06-19 23:46

7.6M

 

[   ]

D2T1 - Hugo Teso - Digging Deeper Into Aviation Security.pdf

2014-06-19 23:46

17M

 

[   ]

D2T1 - James Forshaw - Exploiting XML Digital Signature Implementations.pdf

2014-06-19 23:46

1.7M

 

[   ]

D2T1 - Joshua 'p0sixninja' Hill - SHAttered Dreams.pdf

2014-06-19 23:46

2.1M

 

[   ]

D2T1 - Mark Vincent Yason - Diving Into IE10's Enhanced Protected Mode Sandbox.pdf

2014-06-19 23:46

1.0M

 

[   ]

D2T2 - Rahul Sasi - Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis.pdf

2014-06-19 23:46

2.6M

 

[   ]

D2T2 - Stefan Esser - Tales from iOS 6 Exploitation and iOS 7 Security Changes.pdf

2014-06-19 23:46

2.9M

 

[   ]

D2T2 - Stefano Zanero - Tracking and Characterizing Botnets Using Automatically Generated Domains.pdf

2014-06-19 23:46

2.4M

 

[   ]

D2T2 - Victor van der Veen - A Fast and Complete Android Method Tracer.pdf

2014-06-19 23:46

1.6M

 

[   ]

D2T2 - Vladimir Katalov - Cracking and Analyzing Apple's iCloud Protocol.pdf

2014-06-19 23:46

7.8M

 

[   ]

D2T3 - Ashar Javad - Trusted Friend Attack.pdf

2014-06-19 23:46

15M

 

[   ]

D2T3 - Eric Michaud and Ryan Lackey - Thwarting Evil Maid Attacks.pdf

2014-06-19 23:46

6.9M

 

[   ]

D2T3 - Job de Haas - 20 Ways Past Secure Boot.pdf

2014-06-19 23:46

1.8M

 

[   ]

D2T3 - Keith Lee and Jonathan Werrett - Facebook OSINT.pdf

2014-06-19 23:46

5.2M

 

[   ]

D2T3 - Luiz Eduardo and Joaquim Espinhara - Lost in Translation.pdf

2014-06-19 23:46

16M