Index of /files/hitbsecconf2024bkk/materials
Name
Last modified
Size
Description
Parent Directory
-
D1 COMMSEC - Leaking Kakao - How a Combination of Bugs in KakaoTalk Compromises User Privacy - Dawin Schmidt.pdf
2024-09-21 14:36
2.0M
CLOSING KEYNOTE - The Modern Hacker – From Insight to Impact - Karsten Nohl.pdf
2024-09-03 03:44
3.3M
D2 COMMSEC - Words Have Meaning! Leveraging LLMs to Enhance Insider Threat Investigation Capabilities - Keggy the Keg.pdf
2024-09-03 02:29
10M
D2 COMMSEC - BadUSB Attacks on MacOS - Beyond Using the Terminal and Shell Commands - Nicolas Buzy Debat.pdf
2024-09-03 02:15
2.3M
D2 COMMSEC - Exploring Vulnerabilities in Flutter Mobile Apps Through Reverse Engineering - Sabina Llewellyn.pdf
2024-09-03 02:14
6.0M
D2 COMMSEC - TPMs and the Linux Kernel - A Better Path to Hardware Security - Ignat Korchagin.pdf
2024-09-03 02:13
4.5M
D2 COMMSEC - Breaking Fake Voice Detection with Speaker-Irrelative Features - Xin Liu, Xuan Hai, Yuan Tan, & Song Li.pdf
2024-09-03 02:09
4.1M
D2T1 - One SMS to Root Them All - Exposing Critical Threats in Millions of Connected Devices - Sergey Anufrienko & Alexander Kozlov.pdf
2024-09-03 02:07
10M
D2T1 - Discovering and Investigating Propagated Vulnerabilities from Ethereum to Its Layer-2 Blockchains - Daoyuan Wu & Ning Liu.pdf
2024-09-03 02:06
6.9M
D2T1 - Exploiting the In-Vehicle Browser - A Novel Attack Vector in Autonomous Vehicles - Ravi Rajput.pdf
2024-09-03 02:05
2.9M
D2T1 - Leveraging Request Smuggling For Authentication Bypass and Remote Code Execution - Adam Crosser.pdf
2024-09-03 02:04
13M
D1 COMMSEC - My First and Last Shellcode Loader - Dobin Rutishauser.pdf
2024-09-01 11:47
4.5M
D1 COMMSEC - Design and Development of a Multi-Tenant SIEM Using Security Onion - Wararit Hongkamnerd.pdf
2024-09-01 11:46
1.4M
D1 COMMSEC - CoralRaider Targets Victims Data and Social Media Accounts - Joey Chen & Chetan Raghuprasad.pdf
2024-09-01 11:43
4.4M
D1 COMMSEC - Flash Loans- The Blessing or Curse of DeFi - Kritsada Dechawattana.pdf
2024-09-01 10:08
6.5M
D1 COMMSEC - How Automated Malware Attribution Engines Work - Anton Belousov.pdf
2024-09-01 10:07
12M
D1T1 - Hunting Trojans with AST Transformers and Machine Learning - Stanislav Rakovsky.pdf
2024-09-01 09:41
5.7M
D1T1 - Secret Scanning in Open Source at Scale - Danish Tariq & Hassan Khan Yusufzai.pdf
2024-09-01 09:40
7.4M
D1T1 - Silencing Spies - Revealing Microphone Nonlinear Behavior and Building an Ultrasonic Jammer - Hetian Shi & Qing Wang.pdf
2024-09-01 09:39
14M
D1T1 - Dragon Slaying Guide - Bug Hunting In VMware Device Virtualization - Z. Li, H. Zheng, Y. Liu & J. Huang.pdf
2024-09-01 09:38
7.2M
KEYNOTE 1 - The Modern CISO - Pepijn Kok.pdf
2024-09-01 09:36
11M
Apache/2.4.54 (Ubuntu) Server at conference.hitb.org Port 443