![[ICO]](/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](/icons/back.gif) | Parent Directory | | - | |
![[ ]](/icons/layout.gif) | KEYNOTE 1 - The Modern CISO - Pepijn Kok.pdf | 2024-09-01 09:36 | 11M | |
![[ ]](/icons/layout.gif) | D1T1 - Dragon Slaying Guide - Bug Hunting In VMware Device Virtualization - Z. Li, H. Zheng, Y. Liu & J. Huang.pdf | 2024-09-01 09:38 | 7.2M | |
![[ ]](/icons/layout.gif) | D1T1 - Silencing Spies - Revealing Microphone Nonlinear Behavior and Building an Ultrasonic Jammer - Hetian Shi & Qing Wang.pdf | 2024-09-01 09:39 | 14M | |
![[ ]](/icons/layout.gif) | D1T1 - Secret Scanning in Open Source at Scale - Danish Tariq & Hassan Khan Yusufzai.pdf | 2024-09-01 09:40 | 7.4M | |
![[ ]](/icons/layout.gif) | D1T1 - Hunting Trojans with AST Transformers and Machine Learning - Stanislav Rakovsky.pdf | 2024-09-01 09:41 | 5.7M | |
![[ ]](/icons/layout.gif) | D1 COMMSEC - How Automated Malware Attribution Engines Work - Anton Belousov.pdf | 2024-09-01 10:07 | 12M | |
![[ ]](/icons/layout.gif) | D1 COMMSEC - Flash Loans- The Blessing or Curse of DeFi - Kritsada Dechawattana.pdf | 2024-09-01 10:08 | 6.5M | |
![[ ]](/icons/layout.gif) | D1 COMMSEC - CoralRaider Targets Victims Data and Social Media Accounts - Joey Chen & Chetan Raghuprasad.pdf | 2024-09-01 11:43 | 4.4M | |
![[ ]](/icons/layout.gif) | D1 COMMSEC - Design and Development of a Multi-Tenant SIEM Using Security Onion - Wararit Hongkamnerd.pdf | 2024-09-01 11:46 | 1.4M | |
![[ ]](/icons/layout.gif) | D1 COMMSEC - My First and Last Shellcode Loader - Dobin Rutishauser.pdf | 2024-09-01 11:47 | 4.5M | |
![[ ]](/icons/layout.gif) | D2T1 - Leveraging Request Smuggling For Authentication Bypass and Remote Code Execution - Adam Crosser.pdf | 2024-09-03 02:04 | 13M | |
![[ ]](/icons/layout.gif) | D2T1 - Exploiting the In-Vehicle Browser - A Novel Attack Vector in Autonomous Vehicles - Ravi Rajput.pdf | 2024-09-03 02:05 | 2.9M | |
![[ ]](/icons/layout.gif) | D2T1 - Discovering and Investigating Propagated Vulnerabilities from Ethereum to Its Layer-2 Blockchains - Daoyuan Wu & Ning Liu.pdf | 2024-09-03 02:06 | 6.9M | |
![[ ]](/icons/layout.gif) | D2T1 - One SMS to Root Them All - Exposing Critical Threats in Millions of Connected Devices - Sergey Anufrienko & Alexander Kozlov.pdf | 2024-09-03 02:07 | 10M | |
![[ ]](/icons/layout.gif) | D2 COMMSEC - Breaking Fake Voice Detection with Speaker-Irrelative Features - Xin Liu, Xuan Hai, Yuan Tan, & Song Li.pdf | 2024-09-03 02:09 | 4.1M | |
![[ ]](/icons/layout.gif) | D2 COMMSEC - TPMs and the Linux Kernel - A Better Path to Hardware Security - Ignat Korchagin.pdf | 2024-09-03 02:13 | 4.5M | |
![[ ]](/icons/layout.gif) | D2 COMMSEC - Exploring Vulnerabilities in Flutter Mobile Apps Through Reverse Engineering - Sabina Llewellyn.pdf | 2024-09-03 02:14 | 6.0M | |
![[ ]](/icons/layout.gif) | D2 COMMSEC - BadUSB Attacks on MacOS - Beyond Using the Terminal and Shell Commands - Nicolas Buzy Debat.pdf | 2024-09-03 02:15 | 2.3M | |
![[ ]](/icons/layout.gif) | D2 COMMSEC - Words Have Meaning! Leveraging LLMs to Enhance Insider Threat Investigation Capabilities - Keggy the Keg.pdf | 2024-09-03 02:29 | 10M | |
![[ ]](/icons/layout.gif) | CLOSING KEYNOTE - The Modern Hacker – From Insight to Impact - Karsten Nohl.pdf | 2024-09-03 03:44 | 3.3M | |
![[ ]](/icons/layout.gif) | D1 COMMSEC - Leaking Kakao - How a Combination of Bugs in KakaoTalk Compromises User Privacy - Dawin Schmidt.pdf | 2024-09-21 14:36 | 2.0M | |
|