hitbsecconf2021ams

[   ]D1 COMMSEC - Exploitation with Shell Reverse and Infection with PowerShell - Filipi Pires.pdf2021-05-28 21:497.0M 
[   ]D1 COMMSEC - Model Robustness Will Hurt Data Privacy - Jiqiang Gao & Mengyun Tang.pdf2021-05-28 21:493.3M 
[   ]D1 COMMSEC - One Stop Anomaly Shop - Andrei Cotaie & Tiberiu Boros.pdf2021-05-28 21:498.5M 
[   ]D1 COMMSEC - Shaping The Future of the 0Day Market - Andrea Zapparoli Manzoni.pdf2021-05-28 21:493.0M 
[   ]D1 COMMSEC - The History of Adversarial AI - Alex Polyakov & Eugene Neelou.pdf2021-05-28 21:497.9M 
[   ]D1T1 - Bypassing DEP with Jump-Oriented Programming - Bramwell Brizendine & Austin Babcock.pdf2021-06-01 04:154.7M 
[   ]D1T1 - Client-Side Attacks on Live-Streaming Services Using Grid Computing - S. Yoon, S. Myeong, S. Hwang, T. Yun & T. Kim.pdf2021-06-01 04:154.1M 
[   ]D1T1 - MacOS Local Security - Escaping the Sandbox and Bypassing TCC - Thijs Alkemade & Daan Keuper.pdf2021-06-01 04:1533M 
[   ]D1T1 - POSWorld - Should You be Afraid of Hands-On Payment Devices? - Timur Yunusov & Aleksei Stennikov.pdf2021-06-01 04:154.2M 
[   ]D1T1 - Utilizing Lol-Drivers in Post Exploitation Tradecraft - Baris Akkaya.pdf2021-06-01 04:157.7M 
[   ]D1T2 - A Journey into Synology NAS - QC.pdf2021-06-01 04:155.9M 
[   ]D1T2 - Exploiting QSEE the Raelize Way - Cristofaro Mune & NIek TImmers.pdf2021-06-01 04:153.6M 
[   ]D1T2 - Exploiting QSEE the Raelize Way - Cristofaro Mune & Niek Timmers.pdf2021-05-28 22:003.6M 
[   ]D1T2 - Rebuilding Heavens Gate - ShengHao Ma.pdf2021-06-01 04:15200M 
[   ]D1T2 - When Qiling Framework Meets Symbolic Execution - Kaijern Lau, Kong ZiQiao & Wu ChenXu.pdf2021-06-01 04:151.7M 
[   ]D1T2 - X-in-the-Middle - Attacking Fast Charging Piles and Electric Vehicles - Wu HuiYu & Li Yuxiang.pdf2021-06-01 04:154.5M 
[   ]D2 COMMSEC - 5G Networks and Interconnect Threats - Martin Kacer.pdf2021-05-28 21:494.2M 
[   ]D2 COMMSEC - Breaking Siemens SIMATIC S7 PLC Protection Mechanism - Gao Jian.pdf2021-05-28 21:498.4M 
[   ]D2 COMMSEC - JARM Randomizer Evading JARM Fingerprinting - Dagmawi Mulugeta.pdf2021-05-28 21:491.8M 
[   ]D2 COMMSEC - Playing hide-n-seek with AWS GuardDuty - Sze Siong Teo.pdf2021-05-28 21:491.7M 
[   ]D2T1 - A New Attack Model for Hybrid Mobile Applications - Ce Qin.pdf2021-06-01 04:158.5M 
[   ]D2T1 - How I Found 16 Microsoft Office Excel Vulnerabilities in 6 Months - Quan Jin.pdf2021-06-01 04:15835K 
[   ]D2T1 - The Phishermen - Dissecting Phishing Techniques of CloudDragon APT - Linda Kuo &Zih-Cing Liao .pdf2021-06-01 04:1512M 
[   ]D2T1 - The Rise of Potatoes - Privilege Escalation in Windows Services - Andrea Pierini & Antonio Cocomazzi.pdf2021-06-01 04:152.3M 
[   ]D2T2 - A Black Box Escape Of Qemu Based On The USB Device - L. Kong, Y. Zhang & H. Qu.pdf2021-06-01 04:15782K 
[   ]D2T2 - Attacking Cloud Native Kubernetes with CDK - Zebin Zhou & Yue Xu.pdf2021-06-01 04:159.0M 
[   ]D2T2 - Binary Fuzzing with Snapshot-Assisted-Driven Comparison Branch Analysis - Kijong Son.pdf2021-06-01 04:152.5M 
[   ]D2T2 - Discovering 10+ Vulnerabilities in Virtualbox - Chen Nan.pdf2021-06-01 04:151.9M 
[   ]D2T2 - Insecure Link:Security Analysis and Practical Attacks of LPWAN - Li YuXiang & Wu HuiYu.pdf2021-06-01 04:1541M 
[   ]KEYNOTE 2 - The State of Mobile Security - Zuk Avraham.pdf2021-05-29 22:3611M