Hitbsecconf2018DXB

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory - 
[   ]CLOSING KEYNOTE - Blind Digital Signatures - Dr Manar Abu Talib and Dr Qassim Nasir.pdf2018-11-28 10:335.8M 
[   ]D1 BSIDES - Blockchain - The New Line of Defense - Ramy AlDamati.pdf2018-11-27 23:595.8M 
[   ]D1 BSIDES - Creating Custom Browser Extensions to Hunt Low Hanging Fruits - Rewanth Cool.pdf2018-11-27 22:56928K 
[   ]D1 BSIDES - Cyber Security of the Future - Dr Bushra AlBelooshi.pdf2018-11-27 23:225.5M 
[   ]D1 COMMSEC - Building Security Beyond The Genesis Block - Ryan Shepherd.pdf2018-11-27 23:045.4M 
[   ]D1 COMMSEC - Building Your Own Self Driving, Self Racing Car - Dhillon Kannabhiran.pdf2018-11-27 23:283.1M 
[   ]D1 COMMSEC - Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding - Vikash Yadav.pdf2018-11-27 23:435.4M 
[   ]D1 COMMSEC - Hacking Yachts Remotely - IoT Hacking at Sea - Stephan Gerling.pdf2018-11-27 22:593.0M 
[   ]D1 COMMSEC - Hacking into Broadband and Broadcast TV Systems - Chaouki Kasmi, Thomas Sabono and Pierre Barre.pdf2018-11-27 23:061.6M 
[   ]D1 COMMSEC - Hacking the 0day Market - Andrea Zapparoli Manzoni.pdf2018-11-27 22:504.3M 
[   ]D1 COMMSEC - System-level Threats - Dangerous Assumptions in Modern Product Security - Cristofaro Mune.pdf2018-11-28 04:201.8M 
[   ]D1 COMMSEC - Taking Over Telecom Networks - Loay Hassan Abdelrazak and Hardik Mehta.pdf2018-12-02 16:124.4M 
[   ]D1 KEYNOTE - Crouching Tiger Sudden Keynote - Katie Moussouris.pdf2018-11-27 22:484.1M 
[   ]D1T1 - AI Model Security - Reverse Engineering Machine Learning Models - Kang Li.pdf2018-11-27 23:1014M 
[   ]D1T1 - Hunting for Backdoors in IoT Firmware at Unprecedented Scale - John Toterhi.pdf2018-11-27 23:084.0M 
[   ]D1T1 - Infecting Files On The Fly - Leonardo Nve.pdf2018-11-27 22:547.3M 
[   ]D1T1 - Rooting Routers Using Symbolic Execution - Mathy Vanhoef.pdf2018-11-27 23:331.7M 
[   ]D1T1 - The Phantom Menace- Intel ME Manufacturing Mode - Maxim Goryachy and Mark Ermolov.pdf2018-11-27 23:2222M 
[   ]D1T1 - Virtualizing IoT With Code Coverage Guided Fuzzing - Lau Kai Jern and Nguyen Anh Quynh.pdf2018-11-27 22:528.6M 
[   ]D1T2 - A Multidimensional Hardware Attack and Defense Tool Set - Kunzhe Chai, Jie Fu and Mingchuang Qin.pdf2018-11-27 23:536.3M 
[   ]D1T2 - Cloudy With a Chance of Messages - Extracting Messages from iCloud - Vladimir Katalov.pdf2018-11-27 23:2513M 
[   ]D1T2 - Gold Digging - Discovering Hidden Gems in APKs - Marc Schoenefeld.pdf2018-11-27 23:408.7M 
[   ]D1T2 - Hacking Telephone Systems for Fun and Profit - Himanshu Mehta and Sachin Wagh.pdf2018-11-27 23:1828M 
[   ]D1T2 - IPv666 – Address of the Beast - Marc Newlin and Chris Grayson.pdf2018-11-27 23:402.3M 
[   ]D1T2 - IoT Woodpecker - Intrusion-Detection On The Hardware Bus - Congyuan Xu.pdf2018-11-27 23:367.7M 
[   ]D2 BSIDES - Growth Hacking Your Community - Dr Marwan Al-Zarouni.pdf2018-11-28 05:239.2M 
[   ]D2 BSIDES - Hunting Threats in Your Enterprise - Abdulrahman Alnimari.pdf2018-11-28 05:2521M 
[   ]D2 BSIDES - My Experience of Running CTF Competitions in 7 Arab Countries - Moataz Salah.pdf2018-11-28 04:053.5M 
[   ]D2 BSIDES - Women in Cybersecurity - Heide Young.pdf2018-11-28 04:0413M 
[   ]D2 COMMSEC - A Secured and Robust Wireless Communication System for Low-Latency Applications - Dr Husameldin Mukhtar.pdf2018-11-28 07:0321M 
[   ]D2 COMMSEC - Evolution of Security Threats to Telecommunications Infrastructures - Emmanuel Gadaix.pdf2018-11-28 05:2827M 
[   ]D2 COMMSEC - HWallet - The Simple Cryptocurrency Hardware Wallet - Nemanja Nikodijevic.pdf2018-11-28 07:02576K 
[   ]D2 COMMSEC - Hacking the International RFQ Process - Dino Covotsos.pdf2018-11-28 10:174.1M 
[   ]D2 COMMSEC - Improved Blockchain Infrastructure with IoT - Dr Manar Abu Talib and Dr Qassim Nasir.pdf2018-11-28 10:2619M 
[   ]D2 COMMSEC - Offensive Memory Forensics - Hugo Teso.pdf2018-11-28 06:1030M 
[   ]D2 KEYNOTE - Cyber Arms Race - Mikko Hypponen.pdf2018-11-28 07:223.9M 
[   ]D2T1 - DHCP is Hard - Felix Wilhelm.pdf2018-11-28 03:43422K 
[   ]D2T1 - GLitch Chronicles - Turning WebGL Into A Hammer - Pietro Frigo.pdf2018-11-28 07:0527M 
[   ]D2T1 - Horror On The Bus - Hacking COMBUS - Kirils Solovjovs.pdf2018-11-28 03:436.7M 
[   ]D2T1 - It WISN’t Me - Attacking Industrial Wireless Mesh Networks - Mattijs van Ommeren and Erwin Patternote.pdf2018-11-28 06:191.8M 
[   ]D2T1 - Vote of No Confidence - Second Factor Correctness - Victor Mateu.pdf2018-11-28 10:482.6M 
[   ]D2T2 - Are You Listening? Auditable & Provable Privacy of Smart Speakers - Wang Kang and Yang Bo.pdf2018-11-28 03:5612M 
[   ]D2T2 - Back On The Chain Gang - Blockchain, Public Chain and Contract Security - Li Jiafeng and Yang Changcheng.pdf2018-11-28 03:5118M 
[   ]D2T2 - Capture This - Real Time Packet Processing with FPGAs - Matteo Collura.pdf2018-11-28 06:255.2M 
[   ]D2T2 - NTLM Relay Is Dead Long Live NTLM Relay - Jianing Wang and Junyu Zhou.pdf2018-11-28 07:0926M 
[   ]D2T2 - Using Machine-Learning to Investigate Web Campaigns at Large - Federico Maggi.pdf2018-11-28 10:1710M