hitbsecconf2021ams
D1 COMMSEC - Exploitation with Shell Reverse and Infection with PowerShell - Filipi Pires.pdf
2021-05-28 21:49
7.0M
D1 COMMSEC - Model Robustness Will Hurt Data Privacy - Jiqiang Gao & Mengyun Tang.pdf
2021-05-28 21:49
3.3M
D1 COMMSEC - One Stop Anomaly Shop - Andrei Cotaie & Tiberiu Boros.pdf
2021-05-28 21:49
8.5M
D1 COMMSEC - Shaping The Future of the 0Day Market - Andrea Zapparoli Manzoni.pdf
2021-05-28 21:49
3.0M
D1 COMMSEC - The History of Adversarial AI - Alex Polyakov & Eugene Neelou.pdf
2021-05-28 21:49
7.9M
D1T1 - Bypassing DEP with Jump-Oriented Programming - Bramwell Brizendine & Austin Babcock.pdf
2021-06-01 04:15
4.7M
D1T1 - Client-Side Attacks on Live-Streaming Services Using Grid Computing - S. Yoon, S. Myeong, S. Hwang, T. Yun & T. Kim.pdf
2021-06-01 04:15
4.1M
D1T1 - MacOS Local Security - Escaping the Sandbox and Bypassing TCC - Thijs Alkemade & Daan Keuper.pdf
2021-06-01 04:15
33M
D1T1 - POSWorld - Should You be Afraid of Hands-On Payment Devices? - Timur Yunusov & Aleksei Stennikov.pdf
2021-06-01 04:15
4.2M
D1T1 - Utilizing Lol-Drivers in Post Exploitation Tradecraft - Baris Akkaya.pdf
2021-06-01 04:15
7.7M
D1T2 - A Journey into Synology NAS - QC.pdf
2021-06-01 04:15
5.9M
D1T2 - Exploiting QSEE the Raelize Way - Cristofaro Mune & NIek TImmers.pdf
2021-06-01 04:15
3.6M
D1T2 - Exploiting QSEE the Raelize Way - Cristofaro Mune & Niek Timmers.pdf
2021-05-28 22:00
3.6M
D1T2 - Rebuilding Heavens Gate - ShengHao Ma.pdf
2021-06-01 04:15
200M
D1T2 - When Qiling Framework Meets Symbolic Execution - Kaijern Lau, Kong ZiQiao & Wu ChenXu.pdf
2021-06-01 04:15
1.7M
D1T2 - X-in-the-Middle - Attacking Fast Charging Piles and Electric Vehicles - Wu HuiYu & Li Yuxiang.pdf
2021-06-01 04:15
4.5M
D2 COMMSEC - 5G Networks and Interconnect Threats - Martin Kacer.pdf
2021-05-28 21:49
4.2M
D2 COMMSEC - Breaking Siemens SIMATIC S7 PLC Protection Mechanism - Gao Jian.pdf
2021-05-28 21:49
8.4M
D2 COMMSEC - JARM Randomizer Evading JARM Fingerprinting - Dagmawi Mulugeta.pdf
2021-05-28 21:49
1.8M
D2 COMMSEC - Playing hide-n-seek with AWS GuardDuty - Sze Siong Teo.pdf
2021-05-28 21:49
1.7M
D2T1 - A New Attack Model for Hybrid Mobile Applications - Ce Qin.pdf
2021-06-01 04:15
8.5M
D2T1 - How I Found 16 Microsoft Office Excel Vulnerabilities in 6 Months - Quan Jin.pdf
2021-06-01 04:15
835K
D2T1 - The Phishermen - Dissecting Phishing Techniques of CloudDragon APT - Linda Kuo &Zih-Cing Liao .pdf
2021-06-01 04:15
12M
D2T1 - The Rise of Potatoes - Privilege Escalation in Windows Services - Andrea Pierini & Antonio Cocomazzi.pdf
2021-06-01 04:15
2.3M
D2T2 - A Black Box Escape Of Qemu Based On The USB Device - L. Kong, Y. Zhang & H. Qu.pdf
2021-06-01 04:15
782K
D2T2 - Attacking Cloud Native Kubernetes with CDK - Zebin Zhou & Yue Xu.pdf
2021-06-01 04:15
9.0M
D2T2 - Binary Fuzzing with Snapshot-Assisted-Driven Comparison Branch Analysis - Kijong Son.pdf
2021-06-01 04:15
2.5M
D2T2 - Discovering 10+ Vulnerabilities in Virtualbox - Chen Nan.pdf
2021-06-01 04:15
1.9M
D2T2 - Insecure Link:Security Analysis and Practical Attacks of LPWAN - Li YuXiang & Wu HuiYu.pdf
2021-06-01 04:15
41M
KEYNOTE 2 - The State of Mobile Security - Zuk Avraham.pdf
2021-05-29 22:36
11M