Hitbsecconf2018

[ICO]NameLast modifiedSize

[PARENTDIR]Parent Directory -
[   ]CLOSING KEYNOTE - Amber Baldet - Security is What We Make of It - Blockchain and Beyond.pdf2018-04-13 13:332.1M
[   ]D1 COMMSEC - Dhia Mahjoub and Sarah Brown - Privacy and Protection for Criminals - Behaviors and Patterns of Rogue Hosting Providers.pdf2018-04-12 07:062.6M
[   ]D1 COMMSEC - Josh Stroschein - A Deep Dive Into Malicious Documents.pdf2018-04-12 12:4515M
[   ]D1 COMMSEC - Kelvin Wong - How to Find and Exploit Bugs in IoT Devices.pdf2018-04-12 11:0127M
[   ]D1 COMMSEC - Niels van Dijkhuizen - Keynterceptor - Press Any Key to Continue.pdf2018-04-12 09:423.2M
[   ]D1 COMMSEC - Ofir Arkin - Creating an Isolated Data Center Security Policy Model Using SmartNICs.pdf2018-04-12 09:4710M
[   ]D1 COMMSEC - Saif Elsherei and Ian Kronquist - The Life & Death of Kernel Object Abuse.pdf2018-04-12 05:332.0M
[   ]D1 COMMSEC - Steffen Wendzel - Steganography Ante Portas.pdf2018-04-12 10:5063M
[   ]D1 COMMSEC - Stephen Hilt - Hacking IoT Speakers.pdf2018-04-12 13:0975M
[   ]D1 COMMSEC - Thomas Debize - Modern Pentest Tricks for Faster, Wider, Greater Engagements.pdf2018-04-12 11:391.3M
[   ]D1 COMMSEC - Yann Allain - Practical Quantum Computing for Hackers Without a PhD.pdf2018-04-17 09:4613M
[   ]D1T1 - Areum Lee & Jeonghoon Shin - Fuzzing Javascript Engines for Fun and Pwnage.pdf2018-04-12 13:044.6M
[   ]D1T1 - Don Bailey - Sneaky Element- Real World Attacks Against Secure Elements.pdf2018-04-12 05:482.3M
[   ]D1T1 - Federico Dotta and Piergiovanni Cipolloni - Brida When Burp Suite Meets Frida.pdf2018-04-12 07:033.6M
[   ]D1T1 - Jun Li, Kunzhe Chai and Hongjian Cao - Ghost Tunnel- Covert Data Exfiltration Channel to Circumvent Air Gapping.pdf2018-04-12 09:036.0M
[   ]D1T1 - V. Kropotov, F. Yarochkin, M. Fuentes, L. Gu - Abusing the Travel and Hospitality Industry for Profit.pdf2018-04-12 10:4634M
[   ]D1T1 - Xiaolong Bai & Min Spark Zheng - How to Analyze and Find Bugs in MacOS and iOS Kernel Drivers.pdf2018-04-12 11:4722M
[   ]D1T2 - Bernhard Mueller - Smashing Ethereum Smart Contracts for Fun and ACTUAL Profit.pdf2018-04-13 10:252.0M
[   ]D1T2 - Daniel Bohannon - Invoke-DOSfuscation.pdf2018-04-12 09:426.5M
[   ]D1T2 - Eugene Neyolov - Applying Machine Learning to User Behavior Anomaly Analysis.pdf2018-04-13 01:258.7M
[   ]D1T2 - Yong Wang & Yang Song - Rooting Android 8 with a Kernel Space Mirroring Attack.pdf2018-04-12 11:479.0M
[   ]D1T2 - Yu Hong and Shikang Xing - Attacking Microsoft’s .NET Framework Through CLR.pdf2018-04-12 07:093.2M
[   ]D1T2 - YuXiang Li, HuiYu Wu & Yong Yang - Hacking Intelligent Buildings - Pwning KNX & ZigBee Networks.pdf2018-04-12 10:4115M
[   ]D1T3 - Didier Stevens - SDR Lab.pdf2018-04-12 11:04700K
[   ]D1T3 - Maria Markstedter - From Zero to ARM Assembly Bind Shellcode.pdf2018-04-12 10:433.7M
[   ]D1T3 - Yunding Jian, Jie Fu & Chaoran Wang - Wireless Hacking with HackCUBE.pdf2018-04-12 13:071.8M
[   ]D2 COMMSEC - Asaf Cohen & Ofir Kamil - Hacking a Hospital for Fun and Profit.pdf2018-04-13 09:323.5M
[   ]D2 COMMSEC - Ben Schmidt - Smart Contract (in)security.pdf2018-04-13 10:163.8M
[   ]D2 COMMSEC - Jeremy Brown - ProdSec - A Technical Approach.pdf2018-04-13 13:324.1M
[   ]D2 COMMSEC - Kyeong Joo Jung - Hiding Tasks via Hardware Task Switching.pdf2018-04-13 06:011.0M
[   ]D2 COMMSEC - Ricardo J. Rodriguez & Daniel Uroz - Automatic Generation of ROP Chains Using a Turing-Complete Instruction Set.pdf2018-04-13 09:331.4M
[   ]D2 COMMSEC - Xabier-Ugarte Pedrero - PyREBox - Making Dynamic Instrumentation Great Again.pdf2018-04-23 03:063.6M
[   ]D2T1 - Alfonso Munoz & Jorge Cuadrado - Establishing Covert Channels by Abusing GSM AT Commands.pdf2018-04-13 10:326.6M
[   ]D2T1 - Aviv Grafi & Amit Dori - Sandbox Evasion Using VBA Referencing.pdf2018-04-13 05:301.3M
[   ]D2T1 - Karsten Nohl & Jakob Lell - Uncovering the Android Patch Gap Through Binary-Only Patch Level Analysis.pdf2018-04-13 06:402.5M
[   ]D2T1 - Philip Tsukerman - Expanding Your WMI Lateral Movement Arsenal.pdf2018-04-13 11:2216M
[   ]D2T1 - Sheila Ayelen Berta & Claudio Caracciolo - Backdooring & Remotely Controlling Cars With The Bicho.pdf2018-04-13 09:124.7M
[   ]D2T2 - Fernando Arnaboldi - Exposing Hidden Exploitable Behaviors Using Extended Differential Fuzzing.pdf2018-04-13 10:323.9M
[   ]D2T2 - Michele Spagnuolo & Lukas Weichselbaum - Defense-in-Depth Techniques for Modern Web Applications and Google’s Journey with CSP.pdf2018-04-17 09:491.3M
[   ]D2T2 - Rancho Han - Pwning The Windows Kernel.pdf2018-04-13 06:461.6M
[   ]D2T2 - Rogan Dawes - Towards a Generic Interecepting Proxy.pptx2018-04-13 09:2327M
[   ]D2T2 - Zhang Qing & Bai Guangdong - A New Fuzzing Method for Android.pdf2018-04-13 09:163.2M
[   ]D2T3 - David Rodriguez, Jingchuan Chen & Dhia Mahjoub - Predicting Malicious Domains Using Convolutional Neural Networks.pdf2018-04-13 11:081.6M
[   ]D2T3 - Jonathan Levin - Lend Me Your kernel_task Port.pdf2018-04-13 06:401.7M
[   ]KEYNOTE 1 - Marion Marschalek - The Future, The Past, and … Wait, Where the Hell are We Now.pdf2018-04-12 05:272.8M
[   ]KEYNOTE 2 - Jennifer Leggio - A Risk Assessment of Logo Disclosures.pdf2018-04-13 13:3324M
[   ]WELCOME ADDRESS - Michel van Eeten - Hacks, Sticks, and Carrots - Improving Incentives for Cybersecurity.pdf2018-04-12 03:133.3M

 

[   ]WHITEPAPER - Bernhard Mueller - Smashing Ethereum Smart Contracts for Fun and ACTUAL Profit.pdf2018-04-12 05:442.0M 
[   ]WHITEPAPER - Kyeong Joo Jung - Hiding Tasks via Hardware Task Switching.pdf2018-04-13 06:021.0M 
[   ]WHITEPAPER - Niels van Dijkhuizen - Keynterceptor - Press Any Key to Continue.pdf2018-04-12 09:421.2M