Hitbsecconf2018sg
![]() | Name | Last modified | Size | Description |
---|---|---|---|---|
![]() | Parent Directory | - | ||
![]() | A First Look Into The Security of The Apple Pencil and the Apple SmartKeyboard - Stefan Esser.pdf | 2018-08-30 06:00 | 255K | |
![]() | Exploiting Automation in LTE Mobile Networks - Altaf Shaik & Ravishankar Borgaonkar.pdf | 2018-08-30 05:42 | 562K | |
![]() | FILE Structures - Another Binary Exploitation Technique - An-Jie Yang.pdf | 2018-08-30 03:54 | 4.0M | |
![]() | Hardware Backdoors in x86 CPUs - Christopher Domas.pdf | 2018-08-30 03:07 | 634K | |
![]() | NFC Payments - The Art of Relay and Replay Attacks - Salvador Mendoza.pdf | 2018-09-03 20:07 | 663K | |
![]() | The Road to iOS Sandbox Escape - Rani Idan.pdf | 2018-09-03 19:13 | 574K | |