KONFERENCE BLOG  2023  2024  2023

DATE

NAME

CONFERENCE

CATEGORIE

WEB

2023

VoBERT: Unstable Log Sequence Anomaly Detection: Introducing Vocabulary-Free BERT Black Hat EU 2023 Security

BlackHat

2023

Unmasking APTs: An Automated Approach for Real-World Threat Attribution Black Hat EU 2023 APT

BlackHat

2023

Off The Record - Weaponizing DHCP DNS Dynamic Updates Black Hat EU 2023 Security

BlackHat

2023

One Million ASUS Routers Under Control: Exploiting ASUS DDNS to MITM Admin Credentials Black Hat EU 2023 Hacking

BlackHat

2023

Kidnapping Without Hostages: Virtual Kidnapping and the Dark Road Ahead Black Hat EU 2023 AI

BlackHat

2023

Hacking Your Documentation: Who Should WTFM? Black Hat EU 2023 Hacking

BlackHat

2023

How We Taught ChatGPT-4 to Break mbedTLS AES With Side-Channel Attacks Black Hat EU 2023 AI

BlackHat

2023

A Security RISC? The State of Microarchitectural Attacks on RISC-V Black Hat EU 2023 Attack

BlackHat

2023

Old Code Dies Hard: Finding New Vulnerabilities in Old Third-Party Software Components and the Importance of Having SBoM for IoT/OT Devices Black Hat EU 2023 Vulnerebility

BlackHat

2023

Illegitimate Data Protection Requests - To Delete or to Address? Black Hat EU 2023 Security

BlackHat

2023

How I Learned to Stop Worrying and Build a Modern Detection & Response Program Black Hat EU 2023 Security

BlackHat

2023

Reviving JIT Vulnerabilities: Unleashing the Power of Maglev Compiler Bugs on Chrome Browser Black Hat EU 2023 Exploit

BlackHat

2023

Deleting Your Domain? Preventing Data Leaks at TLD Scale Black Hat EU 2023 Hacking

BlackHat

2023

Breaching the Perimeter via Cloud Synchronized Browser Settings  PAPER Black Hat EU 2023 Security

BlackHat

2023

When The Front Door Becomes a Backdoor: The Security Paradox of OSDP Black Hat EU 2023 Virus

BlackHat

2023

The Pool Party You Will Never Forget: New Process Injection Techniques Using Windows Thread Pools Black Hat EU 2023 Hacking

BlackHat

2023

Security Through Transparency: Scaling Your Customer Trust Program Black Hat EU 2023 Security

BlackHat

2023

Collide+Power: The Evolution of Software-based Power Side-Channels Attacks Black Hat EU 2023 Attack

BlackHat

2023

TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers Black Hat EU 2023 Hacking

BlackHat

2023

Through the Looking Glass: How Open Source Projects See Vulnerability Disclosure Black Hat EU 2023 Vulnerebility

BlackHat

2023

Indirect Prompt Injection Into LLMs Using Images and Sounds Black Hat EU 2023 Hacking

BlackHat

2023

Breaking Theoretical Limits: The Gap Between Virtual NICs and Physical Network Cards Black Hat EU 2023 Hacking

BlackHat

2023

REDIScovering HeadCrab - A Technical Analysis of a Novel Malware and the Mind Behind It Black Hat EU 2023 Malware

BlackHat

2023

A Decade After Stuxnet: How Siemens S7 is Still an Attacker's Heaven Black Hat EU 2023 IoT

BlackHat

2023

TunnelCrack: Leaking VPN Traffic by Manipulating Routing Tables Black Hat EU 2023 Hacking

BlackHat

2023

The Magnetic Pull of Mutable Protection: Worked Examples in Cryptographic Agility Black Hat EU 2023 Cryptography

BlackHat

2023

AutoSpill: Zero Effort Credential Stealing from Mobile Password Managers Black Hat EU 2023 Mobil

BlackHat

2023

Millions of Patient Records at Risk: The Perils of Legacy Protocols Black Hat EU 2023 IoT

BlackHat

2023

LogoFAIL: Security Implications of Image Parsing During System Boot Black Hat EU 2023 Hardware

BlackHat

2023

HODOR: Reducing Attack Surface on Node.js via System Call Limitation Black Hat EU 2023 Hacking

BlackHat

2023

Evils in the Sparse Texture Memory: Exploit Kernel Based on Undefined Behaviors of Graphic APIs Black Hat EU 2023 Exploit BlackHat

2023

D1 COMMSEC - ALPChecker – Detecting Spoofing and Blinding Attacks - Anastasiia Kropova & Igor Korkin.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D1 COMMSEC - Bugs In Blocks - Karsten Nohl.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D1 COMMSEC - Building a Full-Speed Anti-Censorship Router - Kaijern Lau.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D1 COMMSEC - Shining a Light On Solar System Cyber Security - Sick Codes.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D1 COMMSEC Big Match - How I Learned to Stop Reversing and Love the Strings - Paolo Montesel.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D1 LAB - Bring Your Own SOAR Automated Incident Response - Valentine Mairet & Harjeet Sharma.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D1T1 - An Ode to Rabbit Holes - Writing a New Decompiler Just for a Security Audit - Dominic Couture.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D1T1 - Cracking the Shield - Analyzing and Reverse Engineering Antivirus Signatures - Dobin Rutishauser.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D1T1 - Exploiting the Lexmark PostScript Stack - Aaron Adams.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D1T1 - FrankeNAND – Extracting Info From Automotive Internet Units - Alexey Kondikov.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D1T1 - Hakuin - Injecting Brains Into Blind SQL Injection - Jakub Pruzinec & Quynh Anh Nguyen.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D1T1 - How NTLM Relay Ruins Your Exchange Servers - Tianze Ding - pdf.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D1T1 - It Was Harder to Sniff Bluetooth Through My Mask During The Pandemic - Xeno Kovah.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D1T2 - How to Design Your Own Electronic Attack Device - Shupeng Gao.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D1T2 - Lazarus Groups Undercover Operations - Large-Scale Infection Campaigns 2022 – 2023 - Lee Taewoo, Seulgi Lee, Dongwook Kim.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D1T2 - Rogue CDB Escaping from VMware Workstation Through the Disk Controller - Wenxu Yin.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D1T2 - Timekiller - Leveraging Asynchronous Clock to Escape from QEMU KVM - Jia, Lei, Tao & Pan.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D1T2 - gVisor - Modern Linux Sandboxing Technology - Li Qiang.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D2 COMMSEC - A Practical Method of Finding Vulnerabilities in Internet of Things - IeckChae Euom.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D2 COMMSEC - B(l)utter – Reversing Flutter Applications by using Dart Runtime - Worawit Wangwarunyoo.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D2 COMMSEC - The Future of Hacking - Unleashing the Power of OpenAIs GPT-4 Code Interpreter - Dexter Ng.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D2 COMMSEC - The Tragedy of Bluetooth Low Energy - Linfeng Xiao & Dalin Yang.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D2 COMMSEC - Unveiling the Covert Trails of Infostealer Malware Ecosystems - Pavvan Karthick.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D2T1 - Hacking into iOS VOLTE implementation - Hardik Mehta & Rajanish Pathak.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D2T1 - Hunting for Amazon Cognito Security Misconfigurations - Yassine Aboukir.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D2T1 - KeyBleed - Attacking the OneKey Mini - Eric Michaud.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D2T1 - Locate Vulnerabilities of Ethereum Smart Contracts with Semi-Automated Analysis - Boik Su.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D2T1 - Scarlet OT – OT Adversary Emulation for Fun and Profit- Vic Huang & Sol Yang.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D2T1 - Windows Kernel Security - A Deep Dive into Two Exploits Demonstrated at Pwn2Own - Thomas Imbert.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D2T2 - Breaking ML Services - Finding 0-days in Azure Machine Learning - NItesh Surana.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D2T2 - From Unknown Parameter to Root - A Story of Unexpected Intrusion Testing Results - Yvan Genuer.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D2T2 - GPTHound – Your Active Directory Security Assistant - John Jiang.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D2T2 - NVMe - New Vulnerabilities Made Easy - Tal Lossos.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D2T2 - TSSHOCK – Breaking MPC Wallets and Digital Custodians - Huu Giap Nguyen & Anh Khoa Nguyen.pdf hitbsecconf2023hkt  hitbsecconf 

2023

D2T2 - Take a Picture of Your App Code – Android MRI Interpreter - Sunghyoun Song.pdf hitbsecconf2023hkt  hitbsecconf 

2023

Aapo Oksman - certmitm automatic exploitation of TLS certificate validation vulnerabilities-demo.mp4

DefCon31  

DefCon

2023

Aapo Oksman - certmitm automatic exploitation of TLS certificate validation vulnerabilities.pdf

DefCon31  

DefCon

2023

Adrian atrox Dabrowski Gabriel K. Gegenhuber - Cellular carriers hate this trick Using SIM tunneling to travel at light speed.pdf

DefCon31  

DefCon

2023

Alessandro klezVirus Magnosi Arash waldoirc Parsa Athanasios trickster0 Tserpelis - StackMoonwalk A Novel approach to stack spoofing on Windows x64.pdf

DefCon31  

DefCon

2023

Alex - Meduza How an exiled pirate media outlet breaks through the Kremlin's propaganda firewall.pdf

DefCon31  

DefCon

2023

Alex Tereshkin Adam Zabrocki - Breaking BMC The Forgotten Key to the Kingdom-demo.mp4

DefCon31  

DefCon

2023

Alex Tereshkin Adam Zabrocki - Breaking BMC The Forgotten Key to the Kingdom.pdf

DefCon31  

DefCon

2023

Alexander Dalsgaard Krog Alexander Skovsende - Backdoor in the Core - Altering the Intel x86 Instruction Set at Runtime-demo.mp4

DefCon31  

DefCon

2023

Alexander Dalsgaard Krog Alexander Skovsende - Backdoor in the Core - Altering the Intel x86 Instruction Set at Runtime.pdf

DefCon31  

DefCon

2023

Allan dwangoAC Cecil Sauraen Liam MLink Taylor - Legend of Zelda Use After Free (TASBot glitches OoT).pdf

DefCon31  

DefCon

2023

Allison Young Diane Akerman - Private Until Presumed Guilty.pdf

DefCon31  

DefCon

2023

Andrew Brandt - Youre Not George Clooney and This Isnt Ocean's Eleven.pdf

DefCon31  

DefCon

2023

Andrew Brandt - Youre Not George Clooney and This Isnt Ocean's Eleven.pptx

DefCon31  

DefCon

2023

Andréanne Bergeron Olivier Bilodeau - I Watched You Roll the Die Unparalleled RDP Monitoring Reveal Attackers Tradecraft.pdf

DefCon31  

DefCon

2023

Anon - Mass Owning of Seedboxes - A Live Hacking Exhibition.pdf

DefCon31  

DefCon

2023

Asi Greenholts - The GitHub Actions Worm Compromising GitHub repositories through the Actions dependency tree-demo.mp4

DefCon31  

DefCon

2023

Asi Greenholts - The GitHub Actions Worm Compromising GitHub repositories through the Actions dependency tree.pdf

DefCon31  

DefCon

2023

Austin Emmitt - Apple's Predicament NSPredicate Exploitation on macOS and iOS.pdf

DefCon31  

DefCon

2023

Ben Nassi - Video-based Cryptanalysis Extracting Secret Keys from Power LEDs of Various Non-compromised Devices Using a Video Camera.pdf

DefCon31  

DefCon

2023

Ben Sadeghipour Corben Leo - A Series of Unfortunate Events.pptx

DefCon31  

DefCon

2023

Benny Zeltser Jonathan Lusky - The RingHopper Journey or How We Almost Zero-dayΓÇÖd the World.pptx

DefCon31  

DefCon

2023

Benny Zeltser Jonathan Lusky - The RingHopper Journey or How We Almost Zero-day’d the World-demo.mp4

DefCon31  

DefCon

2023

Benny Zeltser Jonathan Lusky - The RingHopper Journey or How We Almost Zero-day’d the World.pptx

DefCon31  

DefCon

2023

Bill Demirkapi - A SSLippery Slope Unraveling the Hidden Dangers of Certificate Misuse.pdf

DefCon31  

DefCon

2023

Bohan Liu Zheng Wang GuanCheng Li - ndays are also 0days Can hackers launch 0day RCE attack on popular softwares only with chromium ndays.pdf

DefCon31  

DefCon

2023

Bohan Liu Zheng Wang GuanCheng Li - ndays are also 0days Can hackers launch 0day RCE attack on popular softwares only with chromium ndays.pdf

DefCon31  

DefCon

2023

Carlo Meijer Wouter Bokslag Jos Wetzels - TETRA Tour de Force Jailbreaking Digital Radios and Base Stations for Fun and Secrets.pdf

DefCon31  

DefCon

2023

Carlos Polop Yago Gutierrez - Exploring Linux Memory Manipulation for Stealth and Evasion Strategies to bypass Read-Only No-Exec and Distroless Environments.pdf

DefCon31  

DefCon

2023

Ceri Coburn - A Broken Marriage Abusing Mixed Vendor Kerberos Stacks-demo.mp4

DefCon31  

DefCon

2023

Ceri Coburn - A Broken Marriage Abusing Mixed Vendor Kerberos Stacks.pdf

DefCon31  

DefCon

2023

Christian quaddi Dameff MD Jacqueline Burgette Jeff r3plicant Tully MD Nitin Natarajan Senator Mark Warner Suzanne Schwartz MD - D0 N0 H4RM A Healthcare Security Conversation.pdf

DefCon31  

DefCon

2023

Christien DilDog Rioux Katelyn Medus4 Bowden - The Internals of Veilid a New Decentralized Application Framework.pdf

DefCon31  

DefCon

2023

Christopher Wade - Physical Attacks Against Smartphones-demo1.mp4

DefCon31  

DefCon

2023

Christopher Wade - Physical Attacks Against Smartphones-demo2.mp4

DefCon31  

DefCon

2023

Christopher Wade - Physical Attacks Against Smartphones.pdf

DefCon31  

DefCon

2023

Dan Borgogno Ileana Barrionuevo - Turning my virtual wallet into a skimming device mPOS solutions.pdf

DefCon31  

DefCon

2023

Dan Petro David Vargas - Badge of Shame Breaking into Secure Facilities with OSDP.pdf

DefCon31  

DefCon

2023

Daniel Avinoam - Contain Yourself Staying Undetected Using the Windows Container Isolation Framework.pdf

DefCon31  

DefCon

2023

Daniel Wegemer - Unlocking hidden powers in Xtensa based Qualcomm Wifi chips-demo.mp4

DefCon31  

DefCon

2023

Daniel Wegemer - Unlocking hidden powers in Xtensa based Qualcomm Wifi chips.pdf

DefCon31  

DefCon

2023

Daniel dos Santos Simon Guiot - Route to bugs Analyzing the security of BGP message parsing-demo.mp4

DefCon31  

DefCon

2023

Daniel dos Santos Simon Guiot - Route to bugs Analyzing the security of BGP message parsing.pdf

DefCon31  

DefCon

2023

David Leadbeater - Terminally Owned - 60 years of escaping.pdf

DefCon31  

DefCon

2023

David McGrew Brandon Enright Andrew Chi - Assessing the Security of Certificates at Scale.pdf

DefCon31  

DefCon

2023

David Melendez Gabriela Gabs García - Spread spectrum techniques in disposable drones for anti drone evasion-demo1.mp4

DefCon31  

DefCon

2023

David Melendez Gabriela Gabs García - Spread spectrum techniques in disposable drones for anti drone evasion-demo2.mp4

DefCon31  

DefCon

2023

David Melendez Gabriela Gabs García - Spread spectrum techniques in disposable drones for anti drone evasion-demo3.mp4

DefCon31  

DefCon

2023

David Melendez Gabriela Gabs García - Spread spectrum techniques in disposable drones for anti drone evasion.pdf

DefCon31  

DefCon

2023

Dennis Giese - Vacuum robot security and privacy - prevent your robot from sucking your data.pdf

DefCon31  

DefCon

2023

Dennis Giese - Vacuum robot security and privacy - prevent your robot from sucking your data.pptx

DefCon31  

DefCon

2023

Dongsung Donny Kim - Your Clocks Have Ears - Timing-Based Browser-Based Local Network Port Scanner-demo.mp4

DefCon31  

DefCon

2023

Dongsung Donny Kim - Your Clocks Have Ears - Timing-Based Browser-Based Local Network Port Scanner.pdf

DefCon31  

DefCon

2023

Dongsung Donny Kim - Your Clocks Have Ears Timing-Based Browser-Based Local Network Port Scanner-demo.mp4

DefCon31  

DefCon

2023

Dr. Bramwell Brizendine Max Libra Kersten Jake Hince - Game-Changing Advances in Windows Shellcode Analysis-demo1.mp4

DefCon31  

DefCon

2023

Dr. Bramwell Brizendine Max Libra Kersten Jake Hince - Game-Changing Advances in Windows Shellcode Analysis-demo2.mp4

DefCon31  

DefCon

2023

Dr. Bramwell Brizendine Max Libra Kersten Jake Hince - Game-Changing Advances in Windows Shellcode Analysis.pdf

DefCon31  

DefCon

2023

Dr. Bramwell Brizendine Shiva Shashank Kusuma - Advanced ROP Framework Pushing ROP to Its Limits-demo1.mp4

DefCon31  

DefCon

2023

Dr. Bramwell Brizendine Shiva Shashank Kusuma - Advanced ROP Framework Pushing ROP to Its Limits-demo2.mp4

DefCon31  

DefCon

2023

Dr. Bramwell Brizendine Shiva Shashank Kusuma - Advanced ROP Framework Pushing ROP to Its Limits-demo3.mp4

DefCon31  

DefCon

2023

Dr. Bramwell Brizendine Shiva Shashank Kusuma - Advanced ROP Framework Pushing ROP to Its Limits-whitepaper.pdf

DefCon31  

DefCon

2023

Dr. Bramwell Brizendine Shiva Shashank Kusuma - Advanced ROP Framework Pushing ROP to Its Limits.pdf

DefCon31  

DefCon

2023

Dr. Bramwell Brizendine Shiva Shashank Kusuma - Advanced ROP Framework Pushing ROP to Its Limits.pptx

DefCon31  

DefCon

2023

Dr. Nestori Syynimaa - From Feature to Weapon Breaking Microsoft Teams and SharePoint Integrity.pdf

DefCon31  

DefCon

2023

Duckie - J4 Gate The Hustler Poker Cheating Scandal investigation and how Hacking helped me do it-game-video.mp4

DefCon31  

DefCon

2023

Duckie - J4 Gate The Hustler Poker Cheating Scandal investigation and how Hacking helped me do it.pdf

DefCon31  

DefCon

2023

ElfMaster - Revolutionizing ELF binary patching with Shiva A JIT binary patching system for Linux-demo.mp4

DefCon31  

DefCon

2023

ElfMaster - Revolutionizing ELF binary patching with Shiva A JIT binary patching system for Linux.pdf

DefCon31  

DefCon

2023

Farzan Karimi Xuan Xing Xiling Gong Eugene Rodionov - Over the Air Under the Radar Attacking and Securing the Pixel Modem-demo.mp4

DefCon31  

DefCon

2023

Farzan Karimi Xuan Xing Xiling Gong Eugene Rodionov - Over the Air Under the Radar Attacking and Securing the Pixel Modem.pdf

DefCon31  

DefCon

2023

Gal Zror - Look Ma I'm the CEO Real-Time Video and Audio Deep-Fake.pptx

DefCon31  

DefCon

2023

James 'albinowax' Kettle - Smashing the state machine the true potential of web race conditions-whitepaper.pdf

DefCon31  

DefCon

2023

James 'albinowax' Kettle - Smashing the state machine the true potential of web race conditions.pdf

DefCon31  

DefCon

2023

James Horseman Zach Hanley - New Isnt Always Novel Greping Your Way to 20K at Pwn2Own and How You Can Too.pdf

DefCon31  

DefCon

2023

Joe Slowik - Burrowing Through The Network Contextualizing The Vulkan Leaks Historical State-Sponsored Offensive Operations.pdf

DefCon31  

DefCon

2023

Joe Sullivan - A Different Uber Post Mortem.pdf

DefCon31  

DefCon

2023

John Novak - Azure B2C 0-Day An Exploit Chain from Public Keys to Microsoft Bug Bounty.pdf

DefCon31  

DefCon

2023

Jonathan Bar Or Michael Pearse Anurag Bohra - Getting a Migraine - uncovering a unique SIP bypass on macOS-demo.mp4

DefCon31  

DefCon

2023

Jonathan Bar Or Michael Pearse Anurag Bohra - Getting a Migraine - uncovering a unique SIP bypass on macOS.pdf

DefCon31  

DefCon

2023

Jonathan Birch - Second Breakfast Implicit and Mutation-Based Serialization Vulnerabilities in .NET-whitepaper.pdf

DefCon31  

DefCon

2023

Jonathan Birch - Second Breakfast Implicit and Mutation-Based Serialization Vulnerabilities in .NET.pdf

DefCon31  

DefCon

2023

Josep Pi Rodriguez - Contactless Overflow Code execution in payment terminals and ATM’s over NFC.pdf

DefCon31  

DefCon

2023

Joseph Gabay - Warshopping - Further Phreaking Smart Shopping Cart Wheels Through RF Sniffing and Hardware Reverse Engineering-sound.mp3

DefCon31  

DefCon

2023

Joseph Gabay - Warshopping - Further Phreaking Smart Shopping Cart Wheels Through RF Sniffing and Hardware Reverse Engineering.pdf

DefCon31  

DefCon

2023

Katie Inns - HL7Magic Medical Data Hacking Made Easy.pdf

DefCon31  

DefCon

2023

Katitza Rodriguez Bill Budington - UNConventional Cybercrime How a Bad Anti-Hacking Treaty is Becoming a Law.pdf

DefCon31  

DefCon

2023

Laurie Kirk - Runtime Riddles Abusing Manipulation Points in the Android Source.pdf

DefCon31  

DefCon

2023

Lorenzo Cococcia - You can't cheat time - Finding foes and yourself with latency trilateration..pdf

DefCon31  

DefCon

2023

Matthew Harris Zachary Bertocchi Scott Campbell Noah Gibson - Boston Infinite Money Glitch Hacking Transit Cards Without Ending Up In Handcuffs-demo.mp4

DefCon31  

DefCon

2023

Matthew Harris Zachary Bertocchi Scott Campbell Noah Gibson - Boston Infinite Money Glitch Hacking Transit Cards Without Ending Up In Handcuffs.pdf

DefCon31  

DefCon

2023

Maxime Clementz - Defeating VPN Always-On.pdf

DefCon31  

DefCon

2023

Miana Ella Windall - Designing RFID Implants How flipping the bird opens doors for me.pdf

DefCon31  

DefCon

2023

Michael Stepankin - mTLS when certificate authentication done wrong.pdf

DefCon31  

DefCon

2023

 Mikhail Shcherbakov Musard Balliu - Silent Spring Prototype Pollution Leads to Remote Code Execution in Node.js.pdf

DefCon31  

DefCon

2023

Mikko Hypponen - Living Next Door to Russia.pdf

DefCon31  

DefCon

2023

NiNi Chen - A Comprehensive Review on the Less-Traveled Road 9 Years of Overlooked MikroTik Pre-Auth RCE.pdf

DefCon31  

DefCon

2023

Nicolas Minvielle Xavier Facélina - Looking into the future what can we learn about hacking in science-fiction.pdf

DefCon31  

DefCon

2023

Nils Amiet Marco Macchetti - Polynonce An ECDSA Attack and Polynomial Dance-demo.mp4

DefCon31  

DefCon

2023

Nils Amiet Marco Macchetti - Polynonce An ECDSA Attack and Polynomial Dance.pdf

DefCon31  

DefCon

2023

Noam Moshe Sharon Brizinov - A Pain in the NAS Exploiting Cloud Connectivity to PWN your NAS.pdf

DefCon31  

DefCon

2023

Omer Attias - The Price of Convenience How Security Vulnerabilities in Global Transportation Payment Systems Can Cost You.pdf

DefCon31  

DefCon

2023

Patrick Wardle - Demystifying ( Bypassing) macOS's Background Task Management.pdf

DefCon31  

DefCon

2023

Patrick Wardle - Nothing but Net Leveraging macOS's Networking Frameworks to Heuristically Detect Malware.pdf

DefCon31  

DefCon

2023

Paz Hameiri - CON trolling the weather.pdf

DefCon31  

DefCon

2023

R.J. McDown - Malware design - abusing legacy Microsoft transports and session architecture.pdf

DefCon31  

DefCon

2023

Renderman Thomas Dang - Damned if you do - The risks of pointing out the emperor is buck naked.pdf

DefCon31  

DefCon

2023

Ricky Lawshae - Fantastic Ethertypes and Where to Find Them.pdf

DefCon31  

DefCon

2023

Ron Ben-Yizhak - NoFilter Abusing Windows Filtering Platform for privilege escalation.pdf

DefCon31  

DefCon

2023

Ryan Johnson Mohamed Elsabagh Angelos Stavrou - Still Vulnerable Out of the Box Revisiting the Security of Prepaid Android Carrier Devices.pdf

DefCon31  

DefCon

2023

STÖK - Weaponizing Plain Text ANSI Escape Sequences as a Forensic Nightmare.pdf

DefCon31  

DefCon

2023

Sam Quinn Jesse Chick - Power Corrupts Corrupt It Back Hacking Power Management in Data Centers.pdf

DefCon31  

DefCon

2023

Sharon Brizinov Noam Moshe - Exploiting OPC-UA in Every Possible Way Practical Attacks Against Modern OPC-UA Architectures.pdf

DefCon31  

DefCon

2023

Sven Cattell Rumman Chowdhury Austin Carson - Growing the Community of AI Hackers with the Generative Red Team.pdf

DefCon31  

DefCon

2023

Taiiwo Artorias Puck TheClockworkBird - Cracking Cicada 3301 The Future of Collaborative Puzzle-Solving.pdf

DefCon31  

DefCon

2023

Taiiwo Artorias Puck TheClockworkBird - Cracking Cicada 3301 The Future of Collaborative Puzzle-Solving.pptx

DefCon31  

DefCon

2023

Tal Skverer - GhostToken Exploiting Google Cloud Platform App Infrastructure to Create Unremovable Trojan Apps.pdf

DefCon31  

DefCon

2023

Tamas Jos - Spooky authentication at a distance-demo.mp4

DefCon31  

DefCon

2023

Tamas Jos - Spooky authentication at a distance-demo2.mp4

DefCon31  

DefCon

2023

Tamas Jos - Spooky authentication at a distance.pdf

DefCon31  

DefCon

2023

Thomas Chauchefoin Paul Gerste - Visual Studio Code is why I have (Workspace) Trust issues.pdf

DefCon31  

DefCon

2023

Tiffany Rad Austin Shamlin - Civil Cyber Defense Use Your Resources to Defend Non-Profits as they Combat Human Trafficking and Subvert Authoritarian Regimes.pdf

DefCon31  

DefCon

2023

Tom Pohl - Private Keys in Public Places.pdf

DefCon31  

DefCon

2023

Tomer Bar Omer Attias - Defender-Pretender When Windows Defender Updates Become a Security Risk.pdf

DefCon31  

DefCon

2023

Tomer Bar Omer Attias - Defender-Pretender When Windows Defender Updates Become a Security Risk.pptx

DefCon31  

DefCon

2023

Tracy Mosley - Nuthin But A G Thang Evolution of Cellular Networks.pdf

DefCon31  

DefCon

2023

Trevor Stevado Sam Haskins - Unlocking Doors from Half a Continent Away-demo.mp4

DefCon31  

DefCon

2023

Trevor Stevado Sam Haskins - Unlocking Doors from Half a Continent Away.pdf

DefCon31  

DefCon

2023

Vangelis Stykas - The Art of Compromising C2 Servers A Web Application Vulnerabilities Perspective.pptx

DefCon31  

DefCon

2023

Wesley McGrew - Retro Exploitation Using Vintage Computing Plaforms as a Vulnerability Research Playground and Learning Environment.pdf

DefCon31  

DefCon

2023

Wojciech Reguła - ELECTRONizing macOS privacy - a new weapon in your red teaming armory.pdf

DefCon31  

DefCon

2023

X - LLMs at the Forefront Pioneering the Future of Fuzz Testing in a Rapidly Changing World.pdf

DefCon31  

DefCon

2023

byt3bl33d3r - SpamChannel Spoofing Emails From 2 Million Domains and Virtually Becoming Satan-demo.mp4

DefCon31  

DefCon

2023

byt3bl33d3r - SpamChannel Spoofing Emails From 2 Million Domains and Virtually Becoming Satan.pdf

DefCon31  

DefCon

2023

cooperq - Tracking the Worlds Dumbest Cyber-Mercenaries.pdf

DefCon31  

DefCon

2023

good pseudonym - Calling it a 0-Day - Hacking at PBXUC Systems.pdf

DefCon31  

DefCon

2023

nullagent rekcahdam - Snoop on to them as they snoop on to us.pdf

DefCon31  

DefCon

2023

nyxgeek - Track the Planet Mapping Identities Monitoring Presence and Decoding Business Alliances in the Azure Ecosystem.pdf

DefCon31  

DefCon

2023

winn0na and Panel - Hacker Court Interactive Scenario.pptx

DefCon31  

DefCon

2023

A Manufacturer's Post-Shipment Approach to Fend-Off IoT Malware in Home Appliances - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

A Pain in the NAS: Exploiting Cloud Connectivity to PWN Your NAS - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

AI Assisted Decision Making of Security Review Needs for New Features - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

All Cops Are Broadcasting: Breaking TETRA After Decades in the Shadows - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

All You Need is Guest - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Bad io_uring: A New Era of Rooting for Android - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Badge of Shame: Breaking into Secure Facilities with OSDP - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Becoming a Dark Knight: Adversary Emulation Demonstration for ATT&CK Evaluations - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

BingBang: Hacking Bing.com (and much more) with Azure Active Directory - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Bridging Cyber and Insurance - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

BTD: Unleashing the Power of Decompilation for x86 Deep Neural Network Executables - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Civil Cyber Defense: Use Your Resources to Defend Non-Profits as They Combat Human Trafficking and Subvert Authoritarian Regimes - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Close Encounters of the Advanced Persistent Kind: Leveraging Rootkits for Post-Exploitation - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

CoDe16; 16 Zero-Day Vulnerabilities Affecting CODESYS Framework Leading to Remote Code Execution on Millions of Industrial Devices Across Industries - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

CodeQL: Also a Powerful Binary Analysis Engine - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Compromising LLMs: The Advent of AI Malware - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Cookie Crumbles: Unveiling Web Session Integrity Vulnerabilities - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Core Escalation: Unleashing the Power of Cross-Core Attacks on Heterogeneous System - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Defender-Pretender: When Windows Defender Updates Become a Security Risk - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Devising and Detecting Phishing: Large Language Models (GPT3, GPT4) vs. Smaller Human Models (V-Triad, Generic Emails) - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Dive into Apple UserFS (Userspace Filesystem) - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Diversity Microtalks: Perspectives on Creating Change - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Diving into Windows Remote Access Service for Pre-Auth Bugs - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs? - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

EDR = Erase Data Remotely, By Cooking An Unforgettable (Byte) Signature Dish - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Endoscope: Unpacking Android Apps with VM-Based Obfuscation - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Evading Logging in the Cloud: Bypassing AWS CloudTrail - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Evasive Maneuvers: Trends in Phishing Evasion & Anti-Evasion - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Exploiting OPC-UA in Every Possible Way: Practical Attacks Against Modern OPC-UA Architectures - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

From Dead Data to Digestion: Extracting Windows Fibers for Your Digital Forensics Diet - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Hot Topics in Cyber and Privacy Regulation - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Houston, We Have a Problem: Analyzing the Security of Low Earth Orbit Satellites - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Chained to Hit: Discovering New Vectors to Gain Remote and Root Access in SAP Enterprise Software - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

I Was Tasked With Enrolling Millions of Developers in 2FA - Here's What Happened - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

I Watched You Roll the Die: Unparalleled RDP Monitoring Reveal Attackers' Tradecraft - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Identifying and Reducing Permission Explosion in AWS: A Graph-Based and Analytical Approach - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Input Output + Syslog (iO+S): Obtaining Data From Locked iOS Devices via Live Monitoring - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

IRonMAN: InterpRetable Incident Inspector Based ON Large-Scale Language Model and Association miNing - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Jailbreaking an Electric Vehicle in 2023 or What It Means to Hotwire Tesla's x86-Based Seat Heater - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Know Thy Enemy: The Taxonomies That Meta Uses to Map the Offensive Privacy Space - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Lemons and Liability: Cyber Warranties as an Experiment in Software Regulation - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Leverage and Demonstrate Value with your Cyber Insurance Renewal - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Lifting the Fog of War - Monitoring, Identifying and Mitigating MS-RPC Based Threats - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Lost Control: Breaking Hardware-Assisted Kernel Control-Flow Integrity with Page-Oriented Programming - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Low-level RASP: Protecting Applications Implemented in High-level Programming Languages - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

MaginotDNS: Attacking the Boundary of DNS Caching Protection - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Make KSMA Great Again: The Art of Rooting Android Devices by GPU MMU Features - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Making and Breaking NSA's Codebreaker Challenge - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Mirage: Cyber Deception Against Autonomous Cyber Attacks - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

MoustachedBouncer: AitM-Powered Surveillance via Belarus ISPs - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

mTLS: When Certificate Authentication is Done Wrong - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

ODDFuzz: Hunting Java Deserialization Gadget Chains via Structure-Aware Directed Greybox Fuzzing - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

One Drive, Double Agent: Clouded OneDrive Turns Sides - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Oven Repair (The Hardware Hacking Way) - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Over the Air, Under the Radar: Attacking and Securing the Pixel Modem - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Physical Attacks Against Smartphones - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Protecting the CISO: A Legal Journey - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Reflections on Trust in the Software Supply Chain - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Route to Bugs: Analyzing the Security of BGP Message Parsing - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Second Breakfast: Implicit and Mutation-Based Serialization Vulnerabilities in .NET - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Seeing Through the Invisible: Radiation Spikes Detected in Chernobyl During the Russian Invasion Show Possible Evidence of Fabrication - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Single Instruction Multiple Data Leaks in Cutting-edge CPUs, AKA Downfall - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Small Leaks, Billions Of Dollars: Practical Cryptographic Exploits That Undermine Leading Crypto Wallets - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Smashing the State Machine: The True Potential of Web Race Conditions - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

The Integration Cyber Security and Insurance: The Journey of Cysurance - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

The Living Dead: Hacking Mobile Face Recognition SDKs with Non-Deepfake Attacks - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

The Yandex Leak: How a Russian Search Giant Uses Consumer Data - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Three New Attacks Against JSON Web Tokens - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Uncovering Azure's Silent Threats: A Journey into Cloud Vulnerabilities - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Unsafe At Any Speed: CISA's Plan to Foster Tech Ecosystem Security - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Weaponizing Plain Text: ANSI Escape Sequences as a Forensic Nightmare - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

What Does an LLM-Powered Threat Intelligence Program Look Like? - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

When a Zero Day and Access Keys Collide in the Cloud: Responding to the SugarCRM 0-Day Vulnerability - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Why Cyber Insurance Should be Your SOC's New Best Friend - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Zero-Touch-Pwn: Abusing Zoom's Zero Touch Provisioning for Remote Attacks on Desk Phones - Black Hat USA 2023 | Briefings Schedule

Black Hat USA 2023

BlackHat

2023

Keynote - Preparing the Long Journey for Data Security

Black Hat ASIA 2023

Security

BlackHat

2023

Alice in Kernel Land: Lessons Learned From the eBPF Rabbit Hole  whitepaper

Black Hat ASIA 2023

Exploit

BlackHat

2023

Revisiting Stealthy Sensitive Information Collection from Android Apps

Black Hat ASIA 2023

Mobile

BlackHat

2023

When Knowledge Graph Meets TTPs: Highly Automated and Adaptive Executable TTP Intelligence for Security Evaluation  whitepaper 

Black Hat ASIA 2023

Security

BlackHat

2023

Dilemma in IoT Access Control: Revealing Novel Attacks and Design Challenges in Mobile-as-a-Gateway IoT

Black Hat ASIA 2023

IoT

BlackHat

2023

Operation Clairvoyance: How APT Groups Spy on the Media Industry

Black Hat ASIA 2023

Malware

BlackHat

2023

Two Bugs With One PoC: Rooting Pixel 6 From Android 12 to Android 13

Black Hat ASIA 2023

Exploit

BlackHat

2023

Dirty Stream Attack, Turning Android Share Targets Into Attack Vectors

Black Hat ASIA 2023

Mobile

BlackHat

2023

Grand Theft House: RF Lock Pick Tool to Unlock Smart Door Lock

Black Hat ASIA 2023

Security

BlackHat

2023

Prototype Pollution Leads to RCE: Gadgets Everywhere

Black Hat ASIA 2023

Security

BlackHat

2023

Insider Threats Packing Their Bags With Corporate Data

Black Hat ASIA 2023

Security

BlackHat

2023

PMFault: Voltage Fault Injection on Server Platforms Through the PMBus

Black Hat ASIA 2023

Security

BlackHat

2023

PPLdump Is Dead. Long Live PPLdump!

Black Hat ASIA 2023

Exploit

BlackHat

2023

firmWar: An Imminent Threat to the Foundation of Computing

Black Hat ASIA 2023

Security

BlackHat

2023

Leveraging Streaming-Based Outlier Detection and SliceLine to Stop Heavily Distributed Bot Attacks  whitepaper

Black Hat ASIA 2023

Security

BlackHat

2023

Nakatomi Space: Lateral Movement as L1 Post-exploitation in OT

Black Hat ASIA 2023

Security

BlackHat

2023

Dirty Bin Cache: A New Code Injection Poisoning Binary Translation Cache

Black Hat ASIA 2023

Exploit

BlackHat

2023

E-Meet (or Emit?) My Keystrokes: How Benign Screen-sharing Meetings Could Leak Typing Behaviors

Black Hat ASIA 2023

Security

BlackHat

2023

Sweet Dreams: Abusing Sleep Mode to Break Wi-Fi Encryption and Disrupt WPA2/3 Networks

Black Hat ASIA 2023

Security

BlackHat

2023

Hand Me Your SECRET, MCU! Microarchitectural Timing Attacks on Microcontrollers are Practical

Black Hat ASIA 2023

Security

BlackHat

2023

New Wine in an Old Bottle: Attacking Chrome WebSQL

Black Hat ASIA 2023

Exploit

BlackHat

2023

Security Advocacy Shouldn't Be for Security Professionals: An Analysis of How the Industry Misses the Mark and How We Can Improve

Black Hat ASIA 2023

Security

BlackHat

2023

Weaponizing Mobile Infrastructure: Are Politically Motivated Cyber Attacks a Threat to Democracy?

Black Hat ASIA 2023

Security

BlackHat

2023

A New Attack Interface in Java Applications

Black Hat ASIA 2023

Security

BlackHat

2023

A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks  whitepaper

Black Hat ASIA 2023

Security

BlackHat

2023

Fuzzing the Native NTFS Read-Write Driver (NTFS3) in the Linux Kernel

Black Hat ASIA 2023

Exploit

BlackHat

2023

Attacking the WebAssembly Compiler of WebKit

Black Hat ASIA 2023

Security

BlackHat

2023

Phoenix Domain Attack: Vulnerable Links in Domain Name Delegation and Revocation  whitepaper

Black Hat ASIA 2023

Security

BlackHat

2023

You Can Run, but You Can't Hide - Finding the Footprints of Hidden Shellcode

Black Hat ASIA 2023

Malware

BlackHat

2023

Breaking the Chain: An Attacker's Perspective on Supply Chain Vulnerabilities and Flaws

Black Hat ASIA 2023

Security

BlackHat

2023

Cloudy With a Chance of Exploits: Compromising Critical Infrastructure Through IIoT Cloud Solutions

Black Hat ASIA 2023

Security

BlackHat