Index of /hitbsecconf2014kul/materials

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]CLOSING - Dhillon Kannabhiran - HITBSecWhat?.pdf2014-10-19 14:58 2.7M 
[   ]D1T1 - Filippo Valsorda - Exploiting ECDSA Failures in the Bitcoin Blockchain.pdf2014-10-15 05:24 4.7M 
[   ]D1T1 - Michele Spagnuolo - Abusing JSONP with Rosetta Flash.pdf2014-10-15 06:19 2.3M 
[   ]D1T1 - Ross Bevington - How I Hacked my DSLR.pdf2014-10-15 08:33 139M 
[   ]D1T1 - Ryan Lackey and Marc Rogers - How a Helpful Man in the Middle Can Help You Evade Monitoring.pdf2014-10-15 11:50 1.0M 
[   ]D1T1 - SENTER Sandman - Using Intel TXT to Attack BIOSes.pdf2014-10-15 09:30 6.7M 
[   ]D1T1 - The Grugq - OPSEC in the Age of Egotistical Giraffe.pdf2014-10-15 11:50 12M 
[   ]D1T2 - Alban Diquet - The Truth About Apples Multipeer Connectivity Framework.pdf2014-10-15 06:19 4.1M 
[   ]D1T2 - Andrea Barisani - Forging the USB Armory.pdf2014-10-15 11:08 8.4M 
[   ]D1T2 - Kallenberg, Kovah, Butterworth and Cornwell - Extreme Privilege Escalation.pdf2014-10-15 11:58 12M 
[   ]D1T2 - Michael Jordon - ARM Wrestling a Printer - How to Mod Firmware.pdf2014-10-15 05:27 36M 
[   ]D1T2 - Richard Johnson - Fuzzing and Patch Analysis - SAGEly Advice.pdf2014-10-15 08:30 831K 
[   ]D1T2 - Stefano Zanero - Automatic Scalable Extraction of Malicious Behaviours.pdf2014-10-15 09:28 1.6M 
[   ]D1T3 - A. Quint and F. Lone-Sang - IRMA - An Open Source Incident Response and Malware Analysis Platform.pdf2014-10-15 06:19 3.6M 
[   ]D1T3 - Cem Gurkok - Tracing Bits of Coin in Disk and Memory.pdf2014-10-15 10:09 5.7M 
[   ]D1T3 - D. Dahl and C. Pedersen - Multi-User Encrypted Communication with No Trust in the Server.pdf2014-10-15 09:36 333K 
[   ]D2T1 - Andrei Costin - Fireworks, Embedded Wireless and Insecurity-by-Design.pdf2014-10-17 07:57 15M 
[   ]D2T1 - Ben Nagy - ALPC Fuzzing Toolkit.pdf2014-10-16 08:43 2.7M 
[   ]D2T1 - Dominic Chell - Breaking Secure Mobile Applications.pdf2014-10-16 06:18 3.4M 
[   ]D2T1 - Haroon Meer Azhar Desai and Marco Slaviero - Weapons of Mass Distraction.pdf2014-10-18 01:26 55M 
[   ]D2T1 - Marc Rogers - Giving ApplePay the Finger.pdf2014-10-16 05:12 2.7M 
[   ]D2T2 - Chris Liu and Matthew Lionetti - TackyDroid.pdf2014-10-16 08:32 13M 
[   ]D2T2 - Mike Ryan - NSA Playset Bluetooth Smart.pdf2014-10-16 10:48 941K 
[   ]D2T2 - Paul S. Ziegler - Image Hoster Diving.pdf2014-10-16 05:20 12M 
[   ]D2T2 - Rosario Valotta - Browser Fuzzing in 2014.pdf2014-10-16 06:16 5.0M 
[   ]D2T3 - F. Yarochkin V. Kropotov and V. Chetvertakov - Identifying Threats in Raw Data Events (Part 1 and 2).pdf2014-10-16 10:32 9.1M 
[   ]KEYNOTE 1 - Nate Cardozo - The Next Crypto Wars or How We Never Learned to Stop Regulating Exports.pdf2014-10-15 04:34 11M 
[   ]KEYNOTE 2 - Katie Moussouris - Into the Dark Ages or on to the Renaissance.pdf2014-10-16 03:59 3.5M 

Apache/2.4.7 (Ubuntu) Server at conference.hitb.org Port 80