hitbsecconf2023ams

CLOSING KEYNOTE - The Hand That Strikes Also Blocks - Saumil Shah.pdf

2023-05-09 23:45

17M

D1 COMMSEC - API Security in the Age of Microservices - Ali Abdollahi.pdf

2023-04-20 10:15

2.3M

D1 COMMSEC - All You Always Wanted to Know About Antiviruses - Marcus Botacin.pdf

2023-04-20 11:45

6.1M

D1 COMMSEC - Exploring JARM - An Active TLS Fingerprinting Algorithm - Mohamad Mokbel.pdf

2023-05-09 23:45

826K

D1 COMMSEC - Nomadic Honeypots - How to Create Actionable CTI - Laurent Oudot.pdf

2023-04-20 14:02

4.6M

D1 COMMSEC - Upgrading Rollback Agnostic Replay Attacks - Carlos Gomez.pdf

2023-04-21 09:23

8.4M

D1T1 - Leveraging Advanced Techniques of DMA Reentrancy to Escape QEMU - Quan Jin & Ao Wang.pdf

2023-04-21 12:38

1.5M

D1T1 - Nakatomi Space - Lateral Movement as L1 Post-Exploitation in OT - Jos Wetzels.pdf

2023-04-20 11:23

7.4M

D1T1 - Poisoned Apples- Current State of iOS Malware Detection - Matthias Frielingsdorf.pdf

2023-04-20 14:04

7.3M

D1T1 - The Lost World of DirectComposition- Hunting Windows Desktop Window Manager Bugs - Zhang WangJunjie, YiSheng He & Wenyue Li.pdf

2023-04-20 14:01

9.1M

D1T1 - Your Not So Home Office - Soho Hacking at Pwn2Own - McCaulay Hudson & Alex Plaskett.pdf

2023-04-20 13:01

5.8M

D1T2 - 3 Years in China - A Tale of Building a REAL Full-Speed Anti-Censorship Router - Kaijern Lau.pdf

2023-04-20 13:59

8.0M

D1T2 - A Tale of Building a REAL Full Speed Anti-Censorship Router - KaiJern Lau.pdf

2023-04-21 12:47

8.0M

D1T2 - Bypassing Anti-Cheats & Hacking Competitive Games - Rohan Aggarwal.pdf

2023-05-11 03:14

2.7M

D1T2 - The Next Generation of Virtualization-Based Obfuscators - Tim Blazytko & Moritz Schloegel.pdf

2023-04-20 13:21

2.3M

D1T2 - The Next Generation of Virtualization-based Obfuscators - Tim Blazytko & Moritz Sholoegel.pdf

2023-04-21 14:12

2.3M

D1T2 - Windows Syscalls in Shellcode - Advanced Techniques for Malicious Functionality - Bramwell Brizendine.pdf

2023-04-20 11:13

17M

D1T2 - XRP Raid Protector - Killing a Critical Bug Worth 40 Billion Dollars - Haoyu Yang.pdf

2023-04-20 10:21

1.5M

D2 COMMSEC - Feeding Gophers to Ghidra - Max Kersten.pdf

2023-04-21 12:57

422K

D2 COMMSEC - Red Wizard - A User-friendly Infrastructure for Red Teams - Ben Brucker.pdf

2023-04-21 12:32

2.7M

D2 COMMSEC - The Return of Stack Overflows in the Linux Kernel - Davide Ornaghi.pdf

2023-04-29 07:39

2.6M

D2 COMMSEC LAB - Developing Malicious Kernel Drivers - Tijme Gommers & Jaan-Jaap Korpershoek.pdf

2023-04-21 14:09

4.2M

D2T1 - A Deep Dive into GarminOS and its MonkeyC Virtual Machine - Tao Sauvage.pdf

2023-04-21 14:14

3.8M

D2T1 - A Security Analysis of Computer Numerical Control Machines in Industry 4.0 - Marco Balduzzi.pdf

2023-04-21 15:14

6.0M

D2T1 - ChatGPT Please Write Me a Piece of Polymorphic Malware - Omer Tsarfati & Eran Shimony.pdf

2023-04-21 14:08

4.5M

D2T1 - How MySQL Servers Can Attack YOU - Martin Rahkmanov & Alexander Rubin.pdf

2023-04-21 12:30

5.4M

D2T1 - Smart Speaker Shenanigans - Making the SONOS One Sing Its Secrets - Peter Geissler.pdf

2023-04-21 13:00

19M

D2T2 - Active Directory Abuse Primitive and Operation Security - Mars Cheng.pdf

2023-05-17 08:10

6.5M

D2T2 - Automated Black-box Security Testing of Smart Embedded Devices - Andrea Continella.pdf

2023-04-21 12:39

5.3M

D2T2 - Privilege Escalation Using DOP in MacOS x86-64 - Yoochan Lee.pdf

2023-04-21 14:06

2.3M