Hitbsecconf2016

 

[   ]

COMMSEC D1 - Michael Gianarakis - Reverse Engineering Swift Applications.pdf

2016-08-25 10:02

2.0M

 

[   ]

COMMSEC D1 - Sanoop Thomas - Halcyon IDE.pdf

2016-08-25 10:02

501K

 

[   ]

COMMSEC D1 - Sweety Chauhan - Data Driven Software Security.pdf

2016-08-25 08:39

1.4M

 

[   ]

COMMSEC D2 - Alfonso De Gregorio - A Code of Ethics for the Private Sector.pdf

2016-08-26 09:46

17M

 

[   ]

COMMSEC D2 - Florian Lukavsky - Fake Presidents Fraud Defrauded.pdf

2016-08-26 09:37

1.5M

 

[   ]

COMMSEC D2 - Paul Craig - Local Privilege Escalation in 2016.pdf

2016-08-27 09:10

2.9M

 

[   ]

COMMSEC D2 - Rajchada Chanajitt - Forensic Analysis and Assessment of Android Banking Apps.pdf

2016-08-29 05:06

24M

 

[   ]

COMMSEC D2 - Tan Kean Siong - IoT Honeypots.pdf

2016-08-26 10:57

5.0M

 

[   ]

COMMSEC D2 - Vanessa Henderson - Copy-paste Vulnerabilities.pdf

2016-08-26 08:26

327K

 

[   ]

D1 - Adam Donenfeld and Yaniv Mordekhay - Stumping The Mobile Chipset.pdf

2016-08-26 05:30

4.1M

 

[   ]

D1 - Bernhard Mueller - Attacking Software Tokens.pdf

2016-08-25 08:30

44M

 

[   ]

D1 - Jonathan Levin - The Apple Sandbox - Deeper into the Quagmire.pdf

2016-08-25 10:05

1.8M

 

[   ]

D1 - Moonbeom Park and Youngjun Park - Understanding Your Opponent Attack Profiling.pdf

2016-08-25 07:45

1.5M

 

[   ]

D1 - Nguyen Anh Quynh - Keystone - A Next Generation Assembler Framework.pdf

2016-08-25 11:28

1.8M

 

[   ]

D1 - Olga Kochetova and Alexey Osipov - ATMs and Their Dirty Little Secrets.pdf

2016-08-25 12:02

1.9M

 

[   ]

D1 - Peter Pi - Attacking NVIDIA's Tegra Platform.pdf

2016-08-25 07:48

726K

 

[   ]

D2 - Koh Yong Chuan - Fuzzing the Windows Kernel.pdf

2016-08-26 05:18

2.0M

 

[   ]

D2 - Matteo Beccaro and Matteo Collura - Abusing Smart Cities.pdf

2016-08-26 06:16

19M

 

[   ]

D2 - Moritz Jodeit -Look Mom I Don't Use Shellcode.pdf

2016-08-26 11:11

2.0M

 

[   ]

D2 - Shlomi Oberman and Ron Shina - Breaking Exploits with Practical Control Flow Integrity.pdf

2016-08-26 08:39

3.8M

 

[   ]

D2 - Stefan Esser - iOS 10 Kernel Heap Revisited.pdf

2016-08-26 10:57

3.6M

 

[   ]

KEYNOTE 1 - Erin Jacobs - I Fight For the Users .pdf

2016-08-25 03:50

61M

 

[   ]

KEYNOTE 2 - Katie Moussouris - Hacking the Pentagon - Bounty Creation Lessons - NO SLIDES.pdf

2016-08-26 05:20

0

[   ]

A Code of Ethics for the Private Sector - Alfonso De Gregorio.pdf

2016-08-26 09:46

160K

 

[   ]

ATMs and Their Dirty Little Secrets - Olga Kochetova & Alexey Osipov.pdf

2016-08-25 12:01

474K

 

[   ]

Abusing Smart Cities - Matteo Beccaro and Matteo Collura.pdf

2016-08-26 06:17

1.4M

 

[   ]

Attacking NVIDIA's Tegra Platform - Peter Pi.pdf

2016-08-25 07:49

389K

 

[   ]

Breaking Exploits with Practical Control Flow Integrity - Shlomi Oberman and Ron Shina.pdf

2016-08-26 08:40

102K

 

[   ]

Hacking Soft Tokens - Bernhard Mueller.pdf

2016-08-25 08:28

6.0M

 

[   ]

Look Mom - I Don't Use Shellcode - Moritz Jodeit.pdf

2016-08-26 11:11

1.3M

 

[   ]

Stumping The Mobile Chipset - Adam Donenfeld and Yaniv Modekhay.pdf

2016-08-26 05:29

1.1M

 

[   ]

Understanding Your Opponent - Attack Profiling - Moonbeom Park and Youngun Park.pdf

2016-08-25 08:37

620K