Index of /hitbsecconf2017ams/materials

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]CLOSING KEYNOTE - Natalie Silvanovich - The ECMA and The Chakra.pdf2017-04-15 16:22 459K 
[   ]D1T1 - A New RISC - Don Bailey.pdf2017-04-13 14:42 22M 
[   ]D1T1 - Ayoub Elaassal - Hacking Customer Information System.pdf2017-04-13 11:23 4.3M 
[   ]D1T1 - Michele Spagnuolo and Lukas Wilschelbaum - So We Broke All CSPS.pdf2017-04-13 12:25 1.6M 
[   ]D1T1 - Richard Johnson - Harnessing Intel Processor Trace on Windows for Vulnerability Discovery.pdf2017-04-13 18:07 3.8M 
[   ]D1T1 - Steven Seeley and Roberto Suggi Liverani - I Got 99 Trends and a # Is All Of Them.pdf2017-04-13 18:27 154M 
[   ]D1T1 - Victor van der Veen - Drammer The Making Of.pdf2017-04-13 15:51 26M 
[   ]D1T2 - JeongHoon Shin - Femotcell Hacking.pdf2017-04-13 16:03 4.4M 
[   ]D1T2 - Jos Wyers - A Guide to Key Impressioning Attacks.pdf2017-04-13 18:05 120M 
[   ]D1T2 - Linan Hao and Long Liu - The Secret of ChakraCore.pdf2017-04-13 14:44 2.0M 
[   ]D1T2 - Najwa Aaraj - Side Channel Attacks Against iOS Crypto Libraries and More.pdf2017-04-13 18:34 1.6M 
[   ]D1T2 - Seunghun Han - Shadow-Box - The Practical and Omnipotent Sandbox.pdf2017-04-13 17:00 2.5M 
[   ]D1T2 - Slawomir Jasek - Cloning Any Android HCE Contactless Card.pdf2017-04-13 13:36 2.8M 
[   ]D1T3 - Clarence Chio and Anto Joseph - Practical Machine Learning in Infosecurity.pdf2017-04-13 14:33 2.3M 
[   ]D1T3 - Didier Stevens - Analyzing Malicious Office Documents.pdf2017-04-13 17:16 833K 
[   ]D1T3 - Steve Lord - Unbridled HIDIOcy.pdf2017-04-13 17:25 1.6M 
[   ]D1T4 - Dominic Spill - Low Cost Open Source Spectrum Monitoring.pdf2017-04-13 18:04 24M 
[   ]D1T4 - George Chatzisofroniou - Exploiting Windows Automatic Wireless Association Algorithm.pdf2017-04-13 16:38 1.0M 
[   ]D1T4 - Marc Newlin and Matt Knight - So You Want to Hack Radios.pdf2017-04-13 17:15 10M 
[   ]D1T4 - Miika Turkia - Pwning Banks.pdf2017-04-13 14:34 519K 
[   ]D1T4 - Niek Timmers and Albert Spruyt - Fault Injection Attacks On Secure Boot.pdf2017-04-13 18:38 2.6M 
[   ]D1T4 - Niels Warnars - Disarming EMET.pdf2017-04-13 11:10 267K 
[   ]D1T4 - Patrick Wardle - Meet and Greet with the MacOS Malware Class of 2016.pdf2017-04-13 15:36 17M 
[   ]D1T4 - Paulus Meesen and Don Mulders - A Passive Listing Ransomware Detector.pdf2017-04-13 12:20 710K 
[   ]D1T4 - Vladamir Katalov - Breaking Apple’s iCloud Keychain.pdf2017-04-13 12:20 5.9M 
[   ]D2T1 - Ben Hayak - Advanced Same Origin Method Execution.pdf2017-04-14 11:25 19M 
[   ]D2T1 - Bing Sun and Chong Xu - Bypassing Memory Mitigation Using Data-Only Exploitation Techniques.pdf2017-04-14 16:02 3.5M 
[   ]D2T1 - Markus Vervier - Hunting for Vulnerabilities in Signal.pdf2017-04-14 14:31 4.7M 
[   ]D2T1 - Patrick Wardle - Oversight - Exposing Spies on MacOS.pdf2017-04-14 16:12 27M 
[   ]D2T1 - S. Huber, S. Artz and S. Rasthofer - Vulnerabilities in Android Password Managers.pdf2017-04-14 14:05 2.3M 
[   ]D2T1 - Trammel Hudson - Bootstrapping Systems with Open Source Firmware.pdf2017-04-14 17:28 16M 
[   ]D2T2 - Anirudh Duggal - Hacking Medical Devices and Healthcare Infrastructure.pdf2017-04-14 17:24 3.8M 
[   ]D2T2 - Antonios Atlasis - An Attack-in-Depth Analysis of Multicast DNS and DNS Service Discovery.pdf2017-04-14 14:31 5.2M 
[   ]D2T2 - Yingtao Zeng, Qing Yang and Jun Li - Car Keyless Entry System Attacks.pdf2017-04-14 12:00 8.5M 
[   ]D2T2 - Yu Hong - Attack Surface Extended by URL Schemes.pdf2017-04-14 14:05 12M 
[   ]D2T3 - James Forshaw - Introduction to Logical Privilege Escalation on Windows.pdf2017-04-14 14:09 3.1M 
[   ]D2T3 - Slawomir Jasek - Blue Picking - Hacking Bluetooth Smart Locks.pdf2017-04-18 21:59 6.8M 
[   ]D2T4 - Aseem Jakhar - IoT Hacking Simplified.pdf2017-04-14 16:01 33M 
[   ]D2T4 - Chris van den Hooven - Will It Blend? CISOs and Hackers.pdf2017-04-14 14:38 610K 
[   ]D2T4 - Don Bailey - Unauthorized Erlang.pdf2017-04-14 15:59 822K 
[   ]D2T4 - Emmanuel Gadaix - A Surprise Encounter With a Telco APT.pdf2017-04-14 16:04 75M 
[   ]D2T4 - Koh Yong Chuan - Understanding the Microsoft Ofice 2016 Protected View Sandbox.pdf2017-04-14 11:24 2.3M 
[   ]D2T4 - Maxim Goryachy and Mark Ermalov - Intel DCI Secrets.pdf2017-04-14 12:04 20M 
[   ]D2T4 - Muhamad Abdul Wahab and Pascal Cortret - Pwning ARM Debug Components.pdf2017-04-14 11:07 2.3M 
[   ]D2T4 - Rob Fletcher - Bug Bounty from a Program’s Perspective.pdf2017-04-14 14:33 637K 
[   ]D2T4 - Steven Wierckx - How to Make a Magic Mirror.pdf2017-04-14 17:21 3.2M 
[   ]KEYNOTE 1 - Saumil Shah - Redefining Defense.pdf2017-04-13 10:51 19M 

Apache/2.4.7 (Ubuntu) Server at conference.hitb.org Port 80