Hitbsecconf2015

 

[   ]

CLOSING NOTE - Dhillon Kannabhiran.pdf

2015-10-16 12:33

183K

 

[   ]

D1 - Alfonso De Gregorio - Extortion and Cooperation in the Zero­-Day Market.pdf

2015-10-14 11:13

29M

 

[   ]

D1 - Chris Rouland - Understanding the IoT from DC to 10Ghz.pdf

2015-10-14 12:23

22M

 

[   ]

D1 - Dawid Czagan - Hacking Cookies in Modern Web Applications and Browsers.pdf

2015-10-14 06:40

75K

 

[   ]

D1 - Julien Lenoir - Implementing Your Own Generic Unpacker.pdf

2015-10-14 05:53

2.3M

 

[   ]

D1 - Lyon Yang - Advanced SOHO Router Exploitation.pdf

2015-10-14 08:40

9.8M

 

[   ]

D1 - Marina Krotofil - Hacking Chemical Plants for Competition and Extortion.pdf

2015-10-14 10:02

19M

 

[   ]

D2 - Eleanor Saitta - Security Design and High Risk Users.pdf

2015-10-15 12:12

1.2M

 

[   ]

D2 - Fatih Ozavci - VoIP Wars - Destroying Jar Jar Lync.pdf

2015-11-26 04:44

4.8M

 

[   ]

D2 - Marco Balduzzi and Vincenzo Ciancaglini - Cybercrime in the Deep Web.pdf

2015-10-15 05:35

8.4M

 

[   ]

D2 - Ryan Welton and Marco Grassi - Current State of Android Privilege Escalation.pdf

2015-10-15 13:17

4.3M

 

[   ]

D2 - Valerie Thomas - Attacking Physical Access Systems.pdf

2015-10-15 09:46

88M

 

[   ]

D2 - Xeno Kovah - Thunderstrike 2 - Sith Strike.pdf

2015-10-16 04:25

52M

 

[   ]

D3 - Dmitry Chastuhin - SAP Afaria - One SMS to Hack a Company.pdf

2015-10-16 05:16

15M

 

[   ]

D3 - Felix Wilhelm - Attacking the FireEye MPS.pdf

2015-10-16 11:26

18M

 

[   ]

D3 - Katie Kleemola and Anthony Lai - Case Study of Targeted Attacks in Asia.pdf

2015-10-16 08:56

11M

 

[   ]

D3 - Marc Heuse - Hiding in Complexity.pdf

2015-10-16 06:18

823K

 

[   ]

D3 - Wen Xu - Root Hundreds and Thousands of Android Devices with One Generic Exploit.pdf

2015-10-16 09:29

2.4M

 

[   ]

KEYNOTE 1 - Kristin Lovejoy - Our Daily Struggle to Balance National Security Interests and Civil Liberties at the Ground Level .pdf

2015-10-14 05:17

3.3M

 

[   ]

KEYNOTE 2 - Ofir Arkin - Security in a World Out of Our Control - NO SLIDES.pdf

2015-10-15 10:53

0

 

[   ]

KEYNOTE 3 - Winn Schwartau - Analogue Network Security.pdf

2015-10-16 08:32

56M

 

[   ]

KEYNOTE 4 (CLOSING) - Barry Greene - Can Vendors Ever Provide Secure Solutions?.pdf

2015-10-16 12:31

5.3M

[   ]

Alfonso De Gregorio - Extortion and Cooperation in the Zero­-Day Market.pdf

2015-10-14 11:13

80K

 

[   ]

Dawid Czagan - Hacking Cookies in Modern Web Applications and Browsers.pdf

2015-10-14 06:41

65K

 

[   ]

Fatih Ozavci - Microsoft Skype for Business - Security Advisory - SOS-15-005.pdf

2015-11-26 04:43

275K

 

[   ]

Julien Lenoir - Implementing Your Own Generic Unpacker.pdf

2015-11-20 01:26

535K

 

[   ]

Lyon Yang - Advanced SOHO Router Exploitation.pdf

2016-04-03 07:13

5.9M

 

[   ]

Marco Balduzzi and Vincenzo Ciancaglini - Cybercrime In The DeepWeb.pdf

2015-10-22 02:49

3.3M

 

[   ]

Wen Xu - Root Hundreds and Thousands of Android Devices with One Generic Exploit.pdf

2015-10-17 08:11

567K

 

[   ]

Xeno Kovah - Thunderstrike 2 - Sith Strike.pdf