Hitbsecconf2017

 

[   ]CLOSING KEYNOTE - Natalie Silvanovich - The ECMA and The Chakra.pdf2017-10-14 21:58459K 
[   ]D1T1 - A New RISC - Don Bailey.pdf2017-10-14 21:5822M 
[   ]D1T1 - Ayoub Elaassal - Hacking Customer Information System.pdf2017-10-14 21:584.3M 
[   ]D1T1 - Michele Spagnuolo and Lukas Wilschelbaum - So We Broke All CSPS.pdf2017-10-14 21:581.6M 
[   ]D1T1 - Richard Johnson - Harnessing Intel Processor Trace on Windows for Vulnerability Discovery.pdf2017-10-14 21:583.8M 
[   ]D1T1 - Steven Seeley and Roberto Suggi Liverani - I Got 99 Trends and a # Is All Of Them.pdf2017-10-14 21:58154M 
[   ]D1T1 - Victor van der Veen - Drammer The Making Of.pdf2017-10-14 21:5826M 
[   ]D1T2 - JeongHoon Shin - Femotcell Hacking.pdf2017-10-14 21:584.4M 
[   ]D1T2 - Jos Wyers - A Guide to Key Impressioning Attacks.pdf2017-10-14 21:58120M 
[   ]D1T2 - Linan Hao and Long Liu - The Secret of ChakraCore.pdf2017-10-14 21:582.0M 
[   ]D1T2 - Najwa Aaraj - Side Channel Attacks Against iOS Crypto Libraries and More.pdf2017-10-14 21:581.6M 
[   ]D1T2 - Seunghun Han - Shadow-Box - The Practical and Omnipotent Sandbox.pdf2017-10-14 21:582.5M 
[   ]D1T2 - Slawomir Jasek - Cloning Any Android HCE Contactless Card.pdf2017-10-14 21:582.8M 
[   ]D1T3 - Clarence Chio and Anto Joseph - Practical Machine Learning in Infosecurity.pdf2017-10-14 21:582.3M 
[   ]D1T3 - Didier Stevens - Analyzing Malicious Office Documents.pdf2017-10-14 21:58833K 
[   ]D1T3 - Steve Lord - Unbridled HIDIOcy.pdf2017-10-14 21:581.6M 
[   ]D1T4 - Dominic Spill - Low Cost Open Source Spectrum Monitoring.pdf2017-10-14 21:5824M 
[   ]D1T4 - George Chatzisofroniou - Exploiting Windows Automatic Wireless Association Algorithm.pdf2017-10-14 21:581.0M 
[   ]D1T4 - Marc Newlin and Matt Knight - So You Want to Hack Radios.pdf2017-10-14 21:5810M 
[   ]D1T4 - Miika Turkia - Pwning Banks.pdf2017-10-14 21:58519K 
[   ]D1T4 - Niek Timmers and Albert Spruyt - Fault Injection Attacks On Secure Boot.pdf2017-10-14 21:582.6M 
[   ]D1T4 - Niels Warnars - Disarming EMET.pdf2017-10-14 21:58267K 
[   ]D1T4 - Patrick Wardle - Meet and Greet with the MacOS Malware Class of 2016.pdf2017-10-14 21:5817M 
[   ]D1T4 - Paulus Meesen and Don Mulders - A Passive Listing Ransomware Detector.pdf2017-10-14 21:58710K 
[   ]D1T4 - Vladamir Katalov - Breaking Apple’s iCloud Keychain.pdf2017-10-14 21:585.9M 
[   ]D2T1 - Ben Hayak - Advanced Same Origin Method Execution.pdf2017-10-14 21:5819M 
[   ]D2T1 - Bing Sun and Chong Xu - Bypassing Memory Mitigation Using Data-Only Exploitation Techniques.pdf2017-10-14 21:583.5M 
[   ]D2T1 - Markus Vervier - Hunting for Vulnerabilities in Signal.pdf2017-10-14 21:584.7M 
[   ]D2T1 - Patrick Wardle - Oversight - Exposing Spies on MacOS.pdf2017-10-14 21:5827M 
[   ]D2T1 - S. Huber, S. Artz and S. Rasthofer - Vulnerabilities in Android Password Managers.pdf2017-10-14 21:582.3M 
[   ]D2T1 - Trammel Hudson - Bootstrapping Systems with Open Source Firmware.pdf2017-10-14 21:5816M 
[   ]D2T2 - Anirudh Duggal - Hacking Medical Devices and Healthcare Infrastructure.pdf2017-10-14 21:583.8M 
[   ]D2T2 - Antonios Atlasis - An Attack-in-Depth Analysis of Multicast DNS and DNS Service Discovery.pdf2017-10-14 21:585.2M 
[   ]D2T2 - Yingtao Zeng, Qing Yang and Jun Li - Car Keyless Entry System Attacks.pdf2017-10-14 21:588.5M 
[   ]D2T2 - Yu Hong - Attack Surface Extended by URL Schemes.pdf2017-10-14 21:5812M 
[   ]D2T3 - James Forshaw - Introduction to Logical Privilege Escalation on Windows.pdf2017-10-14 21:583.1M 
[   ]D2T3 - Slawomir Jasek - Blue Picking - Hacking Bluetooth Smart Locks.pdf2017-10-14 21:586.8M 
[   ]D2T4 - Aseem Jakhar - IoT Hacking Simplified.pdf2017-10-14 21:5833M 
[   ]D2T4 - Chris van den Hooven - Will It Blend? CISOs and Hackers.pdf2017-10-14 21:58610K 
[   ]D2T4 - Don Bailey - Unauthorized Erlang.pdf2017-10-14 21:58822K 
[   ]D2T4 - Emmanuel Gadaix - A Surprise Encounter With a Telco APT.pdf2017-10-14 21:5875M 
[   ]D2T4 - Koh Yong Chuan - Understanding the Microsoft Ofice 2016 Protected View Sandbox.pdf2017-10-14 21:582.3M 
[   ]D2T4 - Maxim Goryachy and Mark Ermalov - Intel DCI Secrets.pdf2017-10-14 21:5820M 
[   ]D2T4 - Muhamad Abdul Wahab and Pascal Cortret - Pwning ARM Debug Components.pdf2017-10-14 21:582.3M 
[   ]D2T4 - Rob Fletcher - Bug Bounty from a Program’s Perspective.pdf2017-10-14 21:58637K 
[   ]D2T4 - Steven Wierckx - How to Make a Magic Mirror.pdf2017-10-14 21:583.2M 
[   ]KEYNOTE 1 - Saumil Shah - Redefining Defense.pdf2017-10-14 21:5819M