Hitbsecconf2019

[ICO]NameLast modifiedSizeDescription

[   ]CLOSING KEYNOTE - Securing Cyber-Physical Systems - Moving Beyond Fear - Stefano Zanero.pdf2019-08-30 06:505.8M 
[   ]D1 - 4G to 5G - New Attacks - Altaf Shaik.pdf2019-09-04 19:001.6M 
[   ]D1 - Advanced Mutation Fuzzing Method For Wireless Protocols - Lidong Li & Xianzi Kong.pdf2019-08-29 03:2343M 
[   ]D1 - Infiltrating Corporate Intranets Like The NSA - A Pre-Auth Remote Code Execution on Leading SSL VPNs - Orange Tsai & Tingyi Chan.pdf2019-08-29 07:214.6M 
[   ]D1 - Static Code Analysis Recognition Evasion - Andreas Wiegenstein.pdf2019-08-28 23:432.7M 
[   ]D1 - Understanding, Attacking & Securing Medical Devices - Ajay Pratap Singh.pdf2019-08-29 06:187.5M 
[   ]D1 - What Species of Fish Is This - Malware Classification with Graph Hash - Chia Ching Fang & Shih-Hao Weng.pdf2019-08-29 03:275.1M 
[   ]D1 - Why You Should Fear Your Mundane Office Equipment - Mario Rivas & Daniel Romero.pdf2019-08-28 23:434.7M 
[   ]D1 COMMSEC - Car Hacking Made Easel By Car Security Quarter (CSQ) - Alina Tan, Chun Yong, Tan Pei Si & Solomon Tan.pdf2019-08-29 02:412.6M 
[   ]D1 COMMSEC - Compendium Vulnus Subestimata - Underrated Security Bugs - Eldar Marcussen.pdf2019-08-29 02:41646K 
[   ]D1 COMMSEC - Hacking Object Detectors Is Just Like Training Neural Networks - J. Xiong, T. Wei, H. Xin, W. Yang, D. Goodman.pdf2019-08-29 03:194.7M 
[   ]D1 COMMSEC - How to Detect Fake Faces (Manipulated Images) Using CNNs - J. Xiong, T. Wei, H. Xin, W. Yang, D. Goodman.pdf2019-08-29 04:533.9M 
[   ]D1 COMMSEC - Security Should Be Smarter, Not Harder - Katie Moussouris.pdf2019-08-29 04:535.0M 
[   ]D1 COMMSEC - Tick Group - Activities Of The Tick Cyber Espionage Group In East Asia Over The Last 10 Years - Cha Minseok.pdf2019-08-29 00:404.3M 
[   ]D1 COMMSEC - Zero to RCE in Two Days - Exploiting Zoom On macOS - Michael Gianarakis & Sean Yeoh.pdf2019-08-29 00:404.3M 
[   ]D1 KEYNOTE - The CISOs Dilemma - Saumil Shah.pdf2019-08-28 23:4710M 
[   ]D2 - 4G LTE Man in the Middle Attacks with a Hacked Femtocell - Xiaodong Zou.pdf2019-08-30 03:318.1M 
[   ]D2 - Bypassing a Hardware-Based Trusted Boot Through x86 CPU Microcode Downgrade - Alexander Ermolov.pdf2019-08-29 23:378.3M 
[   ]D2 - Creating a Fuzzer for Diameter and LTE Telecom Protocols - Sergey Mashukov.pdf2019-08-30 00:295.6M 
[   ]D2 - Launching Feedback-Driven Fuzzing on TrustZone TEE - Andrey Akimov.pdf2019-08-31 20:312.4M 
[   ]D2 - Recreating an iOS 0day Jailbreak Out of Apple’s Security Updates - Stefan Esser.pdf2019-08-30 05:352.9M 
[   ]D2 COMMSEC - Abusing Over-The-Air Client Provisioning - Slava Makkaveev & Artyom Skrobov.pdf2019-08-30 04:431.8M 
[   ]D2 COMMSEC - DFEX – DNS File EXfiltration - Emilio Couto.pdf2019-08-30 00:424.2M 
[   ]D2 COMMSEC - PErfidious - Make PE Backdooring Great Again - Shreyans Doshi.pdf2019-08-29 23:52472K 
[   ]D2 COMMSEC - Physical To Cyber And Back - Fingerprint Scanner Security - Kevin Reed.pdf2019-08-30 04:523.3M 
[   ]D2 COMMSEC - The Future Is Here - Modern Automotive Attack Surfaces - Lior Yaari & Yonatan Migdal.pdf2019-08-30 04:542.9M 
[   ]D2 COMMSEC - Tracking Fake News Based On Deep Learning - T. Wei, Z. LV & D. Goodman.pdf2019-08-29 23:522.4M 
[   ]D2 KEYNOTE - Never Gonna Give You Up, Never Gonna Let You Down - Marc Rogers.pdf2019-08-29 22:328.9M 
[   ]WHITEPAPER - 4G to 5G - New Attacks - Altaf Shaik.pdf2019-09-04 18:59628K