| Name | Last modified | Size |
---|
|
---|
| Parent Directory | | - |
| CLOSING KEYNOTE - Amber Baldet - Security is What We Make of It - Blockchain and Beyond.pdf | 2018-04-13 13:33 | 2.1M |
| D1 COMMSEC - Dhia Mahjoub and Sarah Brown - Privacy and Protection for Criminals - Behaviors and Patterns of Rogue Hosting Providers.pdf | 2018-04-12 07:06 | 2.6M |
| D1 COMMSEC - Josh Stroschein - A Deep Dive Into Malicious Documents.pdf | 2018-04-12 12:45 | 15M |
| D1 COMMSEC - Kelvin Wong - How to Find and Exploit Bugs in IoT Devices.pdf | 2018-04-12 11:01 | 27M |
| D1 COMMSEC - Niels van Dijkhuizen - Keynterceptor - Press Any Key to Continue.pdf | 2018-04-12 09:42 | 3.2M |
| D1 COMMSEC - Ofir Arkin - Creating an Isolated Data Center Security Policy Model Using SmartNICs.pdf | 2018-04-12 09:47 | 10M |
| D1 COMMSEC - Saif Elsherei and Ian Kronquist - The Life & Death of Kernel Object Abuse.pdf | 2018-04-12 05:33 | 2.0M |
| D1 COMMSEC - Steffen Wendzel - Steganography Ante Portas.pdf | 2018-04-12 10:50 | 63M |
| D1 COMMSEC - Stephen Hilt - Hacking IoT Speakers.pdf | 2018-04-12 13:09 | 75M |
| D1 COMMSEC - Thomas Debize - Modern Pentest Tricks for Faster, Wider, Greater Engagements.pdf | 2018-04-12 11:39 | 1.3M |
| D1 COMMSEC - Yann Allain - Practical Quantum Computing for Hackers Without a PhD.pdf | 2018-04-17 09:46 | 13M |
| D1T1 - Areum Lee & Jeonghoon Shin - Fuzzing Javascript Engines for Fun and Pwnage.pdf | 2018-04-12 13:04 | 4.6M |
| D1T1 - Don Bailey - Sneaky Element- Real World Attacks Against Secure Elements.pdf | 2018-04-12 05:48 | 2.3M |
| D1T1 - Federico Dotta and Piergiovanni Cipolloni - Brida When Burp Suite Meets Frida.pdf | 2018-04-12 07:03 | 3.6M |
| D1T1 - Jun Li, Kunzhe Chai and Hongjian Cao - Ghost Tunnel- Covert Data Exfiltration Channel to Circumvent Air Gapping.pdf | 2018-04-12 09:03 | 6.0M |
| D1T1 - V. Kropotov, F. Yarochkin, M. Fuentes, L. Gu - Abusing the Travel and Hospitality Industry for Profit.pdf | 2018-04-12 10:46 | 34M |
| D1T1 - Xiaolong Bai & Min Spark Zheng - How to Analyze and Find Bugs in MacOS and iOS Kernel Drivers.pdf | 2018-04-12 11:47 | 22M |
| D1T2 - Bernhard Mueller - Smashing Ethereum Smart Contracts for Fun and ACTUAL Profit.pdf | 2018-04-13 10:25 | 2.0M |
| D1T2 - Daniel Bohannon - Invoke-DOSfuscation.pdf | 2018-04-12 09:42 | 6.5M |
| D1T2 - Eugene Neyolov - Applying Machine Learning to User Behavior Anomaly Analysis.pdf | 2018-04-13 01:25 | 8.7M |
| D1T2 - Yong Wang & Yang Song - Rooting Android 8 with a Kernel Space Mirroring Attack.pdf | 2018-04-12 11:47 | 9.0M |
| D1T2 - Yu Hong and Shikang Xing - Attacking Microsoft’s .NET Framework Through CLR.pdf | 2018-04-12 07:09 | 3.2M |
| D1T2 - YuXiang Li, HuiYu Wu & Yong Yang - Hacking Intelligent Buildings - Pwning KNX & ZigBee Networks.pdf | 2018-04-12 10:41 | 15M |
| D1T3 - Didier Stevens - SDR Lab.pdf | 2018-04-12 11:04 | 700K |
| D1T3 - Maria Markstedter - From Zero to ARM Assembly Bind Shellcode.pdf | 2018-04-12 10:43 | 3.7M |
| D1T3 - Yunding Jian, Jie Fu & Chaoran Wang - Wireless Hacking with HackCUBE.pdf | 2018-04-12 13:07 | 1.8M |
| D2 COMMSEC - Asaf Cohen & Ofir Kamil - Hacking a Hospital for Fun and Profit.pdf | 2018-04-13 09:32 | 3.5M |
| D2 COMMSEC - Ben Schmidt - Smart Contract (in)security.pdf | 2018-04-13 10:16 | 3.8M |
| D2 COMMSEC - Jeremy Brown - ProdSec - A Technical Approach.pdf | 2018-04-13 13:32 | 4.1M |
| D2 COMMSEC - Kyeong Joo Jung - Hiding Tasks via Hardware Task Switching.pdf | 2018-04-13 06:01 | 1.0M |
| D2 COMMSEC - Ricardo J. Rodriguez & Daniel Uroz - Automatic Generation of ROP Chains Using a Turing-Complete Instruction Set.pdf | 2018-04-13 09:33 | 1.4M |
| D2 COMMSEC - Xabier-Ugarte Pedrero - PyREBox - Making Dynamic Instrumentation Great Again.pdf | 2018-04-23 03:06 | 3.6M |
| D2T1 - Alfonso Munoz & Jorge Cuadrado - Establishing Covert Channels by Abusing GSM AT Commands.pdf | 2018-04-13 10:32 | 6.6M |
| D2T1 - Aviv Grafi & Amit Dori - Sandbox Evasion Using VBA Referencing.pdf | 2018-04-13 05:30 | 1.3M |
| D2T1 - Karsten Nohl & Jakob Lell - Uncovering the Android Patch Gap Through Binary-Only Patch Level Analysis.pdf | 2018-04-13 06:40 | 2.5M |
| D2T1 - Philip Tsukerman - Expanding Your WMI Lateral Movement Arsenal.pdf | 2018-04-13 11:22 | 16M |
| D2T1 - Sheila Ayelen Berta & Claudio Caracciolo - Backdooring & Remotely Controlling Cars With The Bicho.pdf | 2018-04-13 09:12 | 4.7M |
| D2T2 - Fernando Arnaboldi - Exposing Hidden Exploitable Behaviors Using Extended Differential Fuzzing.pdf | 2018-04-13 10:32 | 3.9M |
| D2T2 - Michele Spagnuolo & Lukas Weichselbaum - Defense-in-Depth Techniques for Modern Web Applications and Google’s Journey with CSP.pdf | 2018-04-17 09:49 | 1.3M |
| D2T2 - Rancho Han - Pwning The Windows Kernel.pdf | 2018-04-13 06:46 | 1.6M |
| D2T2 - Rogan Dawes - Towards a Generic Interecepting Proxy.pptx | 2018-04-13 09:23 | 27M |
| D2T2 - Zhang Qing & Bai Guangdong - A New Fuzzing Method for Android.pdf | 2018-04-13 09:16 | 3.2M |
| D2T3 - David Rodriguez, Jingchuan Chen & Dhia Mahjoub - Predicting Malicious Domains Using Convolutional Neural Networks.pdf | 2018-04-13 11:08 | 1.6M |
| D2T3 - Jonathan Levin - Lend Me Your kernel_task Port.pdf | 2018-04-13 06:40 | 1.7M |
| KEYNOTE 1 - Marion Marschalek - The Future, The Past, and … Wait, Where the Hell are We Now.pdf | 2018-04-12 05:27 | 2.8M |
| KEYNOTE 2 - Jennifer Leggio - A Risk Assessment of Logo Disclosures.pdf | 2018-04-13 13:33 | 24M |
| WELCOME ADDRESS - Michel van Eeten - Hacks, Sticks, and Carrots - Improving Incentives for Cybersecurity.pdf | 2018-04-12 03:13 | 3.3M |