Hitbsecconf201
7
CLOSING KEYNOTE - Natalie Silvanovich - The ECMA and The Chakra.pdf
2017-10-14 21:58
459K
D1T1 - A New RISC - Don Bailey.pdf
2017-10-14 21:58
22M
D1T1 - Ayoub Elaassal - Hacking Customer Information System.pdf
2017-10-14 21:58
4.3M
D1T1 - Michele Spagnuolo and Lukas Wilschelbaum - So We Broke All CSPS.pdf
2017-10-14 21:58
1.6M
D1T1 - Richard Johnson - Harnessing Intel Processor Trace on Windows for Vulnerability Discovery.pdf
2017-10-14 21:58
3.8M
D1T1 - Steven Seeley and Roberto Suggi Liverani - I Got 99 Trends and a # Is All Of Them.pdf
2017-10-14 21:58
154M
D1T1 - Victor van der Veen - Drammer The Making Of.pdf
2017-10-14 21:58
26M
D1T2 - JeongHoon Shin - Femotcell Hacking.pdf
2017-10-14 21:58
4.4M
D1T2 - Jos Wyers - A Guide to Key Impressioning Attacks.pdf
2017-10-14 21:58
120M
D1T2 - Linan Hao and Long Liu - The Secret of ChakraCore.pdf
2017-10-14 21:58
2.0M
D1T2 - Najwa Aaraj - Side Channel Attacks Against iOS Crypto Libraries and More.pdf
2017-10-14 21:58
1.6M
D1T2 - Seunghun Han - Shadow-Box - The Practical and Omnipotent Sandbox.pdf
2017-10-14 21:58
2.5M
D1T2 - Slawomir Jasek - Cloning Any Android HCE Contactless Card.pdf
2017-10-14 21:58
2.8M
D1T3 - Clarence Chio and Anto Joseph - Practical Machine Learning in Infosecurity.pdf
2017-10-14 21:58
2.3M
D1T3 - Didier Stevens - Analyzing Malicious Office Documents.pdf
2017-10-14 21:58
833K
D1T3 - Steve Lord - Unbridled HIDIOcy.pdf
2017-10-14 21:58
1.6M
D1T4 - Dominic Spill - Low Cost Open Source Spectrum Monitoring.pdf
2017-10-14 21:58
24M
D1T4 - George Chatzisofroniou - Exploiting Windows Automatic Wireless Association Algorithm.pdf
2017-10-14 21:58
1.0M
D1T4 - Marc Newlin and Matt Knight - So You Want to Hack Radios.pdf
2017-10-14 21:58
10M
D1T4 - Miika Turkia - Pwning Banks.pdf
2017-10-14 21:58
519K
D1T4 - Niek Timmers and Albert Spruyt - Fault Injection Attacks On Secure Boot.pdf
2017-10-14 21:58
2.6M
D1T4 - Niels Warnars - Disarming EMET.pdf
2017-10-14 21:58
267K
D1T4 - Patrick Wardle - Meet and Greet with the MacOS Malware Class of 2016.pdf
2017-10-14 21:58
17M
D1T4 - Paulus Meesen and Don Mulders - A Passive Listing Ransomware Detector.pdf
2017-10-14 21:58
710K
D1T4 - Vladamir Katalov - Breaking Apple’s iCloud Keychain.pdf
2017-10-14 21:58
5.9M
D2T1 - Ben Hayak - Advanced Same Origin Method Execution.pdf
2017-10-14 21:58
19M
D2T1 - Bing Sun and Chong Xu - Bypassing Memory Mitigation Using Data-Only Exploitation Techniques.pdf
2017-10-14 21:58
3.5M
D2T1 - Markus Vervier - Hunting for Vulnerabilities in Signal.pdf
2017-10-14 21:58
4.7M
D2T1 - Patrick Wardle - Oversight - Exposing Spies on MacOS.pdf
2017-10-14 21:58
27M
D2T1 - S. Huber, S. Artz and S. Rasthofer - Vulnerabilities in Android Password Managers.pdf
2017-10-14 21:58
2.3M
D2T1 - Trammel Hudson - Bootstrapping Systems with Open Source Firmware.pdf
2017-10-14 21:58
16M
D2T2 - Anirudh Duggal - Hacking Medical Devices and Healthcare Infrastructure.pdf
2017-10-14 21:58
3.8M
D2T2 - Antonios Atlasis - An Attack-in-Depth Analysis of Multicast DNS and DNS Service Discovery.pdf
2017-10-14 21:58
5.2M
D2T2 - Yingtao Zeng, Qing Yang and Jun Li - Car Keyless Entry System Attacks.pdf
2017-10-14 21:58
8.5M
D2T2 - Yu Hong - Attack Surface Extended by URL Schemes.pdf
2017-10-14 21:58
12M
D2T3 - James Forshaw - Introduction to Logical Privilege Escalation on Windows.pdf
2017-10-14 21:58
3.1M
D2T3 - Slawomir Jasek - Blue Picking - Hacking Bluetooth Smart Locks.pdf
2017-10-14 21:58
6.8M
D2T4 - Aseem Jakhar - IoT Hacking Simplified.pdf
2017-10-14 21:58
33M
D2T4 - Chris van den Hooven - Will It Blend? CISOs and Hackers.pdf
2017-10-14 21:58
610K
D2T4 - Don Bailey - Unauthorized Erlang.pdf
2017-10-14 21:58
822K
D2T4 - Emmanuel Gadaix - A Surprise Encounter With a Telco APT.pdf
2017-10-14 21:58
75M
D2T4 - Koh Yong Chuan - Understanding the Microsoft Ofice 2016 Protected View Sandbox.pdf
2017-10-14 21:58
2.3M
D2T4 - Maxim Goryachy and Mark Ermalov - Intel DCI Secrets.pdf
2017-10-14 21:58
20M
D2T4 - Muhamad Abdul Wahab and Pascal Cortret - Pwning ARM Debug Components.pdf
2017-10-14 21:58
2.3M
D2T4 - Rob Fletcher - Bug Bounty from a Program’s Perspective.pdf
2017-10-14 21:58
637K
D2T4 - Steven Wierckx - How to Make a Magic Mirror.pdf
2017-10-14 21:58
3.2M
KEYNOTE 1 - Saumil Shah - Redefining Defense.pdf
2017-10-14 21:58
19M