| Name | Last modified | Size | Description |
---|
|
---|
| CLOSING KEYNOTE - Securing Cyber-Physical Systems - Moving Beyond Fear - Stefano Zanero.pdf | 2019-08-30 06:50 | 5.8M | |
| D1 - 4G to 5G - New Attacks - Altaf Shaik.pdf | 2019-09-04 19:00 | 1.6M | |
| D1 - Advanced Mutation Fuzzing Method For Wireless Protocols - Lidong Li & Xianzi Kong.pdf | 2019-08-29 03:23 | 43M | |
| D1 - Infiltrating Corporate Intranets Like The NSA - A Pre-Auth Remote Code Execution on Leading SSL VPNs - Orange Tsai & Tingyi Chan.pdf | 2019-08-29 07:21 | 4.6M | |
| D1 - Static Code Analysis Recognition Evasion - Andreas Wiegenstein.pdf | 2019-08-28 23:43 | 2.7M | |
| D1 - Understanding, Attacking & Securing Medical Devices - Ajay Pratap Singh.pdf | 2019-08-29 06:18 | 7.5M | |
| D1 - What Species of Fish Is This - Malware Classification with Graph Hash - Chia Ching Fang & Shih-Hao Weng.pdf | 2019-08-29 03:27 | 5.1M | |
| D1 - Why You Should Fear Your Mundane Office Equipment - Mario Rivas & Daniel Romero.pdf | 2019-08-28 23:43 | 4.7M | |
| D1 COMMSEC - Car Hacking Made Easel By Car Security Quarter (CSQ) - Alina Tan, Chun Yong, Tan Pei Si & Solomon Tan.pdf | 2019-08-29 02:41 | 2.6M | |
| D1 COMMSEC - Compendium Vulnus Subestimata - Underrated Security Bugs - Eldar Marcussen.pdf | 2019-08-29 02:41 | 646K | |
| D1 COMMSEC - Hacking Object Detectors Is Just Like Training Neural Networks - J. Xiong, T. Wei, H. Xin, W. Yang, D. Goodman.pdf | 2019-08-29 03:19 | 4.7M | |
| D1 COMMSEC - How to Detect Fake Faces (Manipulated Images) Using CNNs - J. Xiong, T. Wei, H. Xin, W. Yang, D. Goodman.pdf | 2019-08-29 04:53 | 3.9M | |
| D1 COMMSEC - Security Should Be Smarter, Not Harder - Katie Moussouris.pdf | 2019-08-29 04:53 | 5.0M | |
| D1 COMMSEC - Tick Group - Activities Of The Tick Cyber Espionage Group In East Asia Over The Last 10 Years - Cha Minseok.pdf | 2019-08-29 00:40 | 4.3M | |
| D1 COMMSEC - Zero to RCE in Two Days - Exploiting Zoom On macOS - Michael Gianarakis & Sean Yeoh.pdf | 2019-08-29 00:40 | 4.3M | |
| D1 KEYNOTE - The CISOs Dilemma - Saumil Shah.pdf | 2019-08-28 23:47 | 10M | |
| D2 - 4G LTE Man in the Middle Attacks with a Hacked Femtocell - Xiaodong Zou.pdf | 2019-08-30 03:31 | 8.1M | |
| D2 - Bypassing a Hardware-Based Trusted Boot Through x86 CPU Microcode Downgrade - Alexander Ermolov.pdf | 2019-08-29 23:37 | 8.3M | |
| D2 - Creating a Fuzzer for Diameter and LTE Telecom Protocols - Sergey Mashukov.pdf | 2019-08-30 00:29 | 5.6M | |
| D2 - Launching Feedback-Driven Fuzzing on TrustZone TEE - Andrey Akimov.pdf | 2019-08-31 20:31 | 2.4M | |
| D2 - Recreating an iOS 0day Jailbreak Out of Apple’s Security Updates - Stefan Esser.pdf | 2019-08-30 05:35 | 2.9M | |
| D2 COMMSEC - Abusing Over-The-Air Client Provisioning - Slava Makkaveev & Artyom Skrobov.pdf | 2019-08-30 04:43 | 1.8M | |
| D2 COMMSEC - DFEX – DNS File EXfiltration - Emilio Couto.pdf | 2019-08-30 00:42 | 4.2M | |
| D2 COMMSEC - PErfidious - Make PE Backdooring Great Again - Shreyans Doshi.pdf | 2019-08-29 23:52 | 472K | |
| D2 COMMSEC - Physical To Cyber And Back - Fingerprint Scanner Security - Kevin Reed.pdf | 2019-08-30 04:52 | 3.3M | |
| D2 COMMSEC - The Future Is Here - Modern Automotive Attack Surfaces - Lior Yaari & Yonatan Migdal.pdf | 2019-08-30 04:54 | 2.9M | |
| D2 COMMSEC - Tracking Fake News Based On Deep Learning - T. Wei, Z. LV & D. Goodman.pdf | 2019-08-29 23:52 | 2.4M | |
| D2 KEYNOTE - Never Gonna Give You Up, Never Gonna Let You Down - Marc Rogers.pdf | 2019-08-29 22:32 | 8.9M | |
| WHITEPAPER - 4G to 5G - New Attacks - Altaf Shaik.pdf | 2019-09-04 18:59 | 628K | |
|
---|