Index of /files/hitbsecconf2024bkk/materials

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]D1 COMMSEC - Design and Development of a Multi-Tenant SIEM Using Security Onion - Wararit Hongkamnerd.pdf2024-09-01 11:46 1.4M 
[   ]D1 COMMSEC - Leaking Kakao - How a Combination of Bugs in KakaoTalk Compromises User Privacy - Dawin Schmidt.pdf2024-09-21 14:36 2.0M 
[   ]D2 COMMSEC - BadUSB Attacks on MacOS - Beyond Using the Terminal and Shell Commands - Nicolas Buzy Debat.pdf2024-09-03 02:15 2.3M 
[   ]D2T1 - Exploiting the In-Vehicle Browser - A Novel Attack Vector in Autonomous Vehicles - Ravi Rajput.pdf2024-09-03 02:05 2.9M 
[   ]CLOSING KEYNOTE - The Modern Hacker – From Insight to Impact - Karsten Nohl.pdf2024-09-03 03:44 3.3M 
[   ]D2 COMMSEC - Breaking Fake Voice Detection with Speaker-Irrelative Features - Xin Liu, Xuan Hai, Yuan Tan, & Song Li.pdf2024-09-03 02:09 4.1M 
[   ]D1 COMMSEC - CoralRaider Targets Victims Data and Social Media Accounts - Joey Chen & Chetan Raghuprasad.pdf2024-09-01 11:43 4.4M 
[   ]D1 COMMSEC - My First and Last Shellcode Loader - Dobin Rutishauser.pdf2024-09-01 11:47 4.5M 
[   ]D2 COMMSEC - TPMs and the Linux Kernel - A Better Path to Hardware Security - Ignat Korchagin.pdf2024-09-03 02:13 4.5M 
[   ]D1T1 - Hunting Trojans with AST Transformers and Machine Learning - Stanislav Rakovsky.pdf2024-09-01 09:41 5.7M 
[   ]D2 COMMSEC - Exploring Vulnerabilities in Flutter Mobile Apps Through Reverse Engineering - Sabina Llewellyn.pdf2024-09-03 02:14 6.0M 
[   ]D1 COMMSEC - Flash Loans- The Blessing or Curse of DeFi - Kritsada Dechawattana.pdf2024-09-01 10:08 6.5M 
[   ]D2T1 - Discovering and Investigating Propagated Vulnerabilities from Ethereum to Its Layer-2 Blockchains - Daoyuan Wu & Ning Liu.pdf2024-09-03 02:06 6.9M 
[   ]D1T1 - Dragon Slaying Guide - Bug Hunting In VMware Device Virtualization - Z. Li, H. Zheng, Y. Liu & J. Huang.pdf2024-09-01 09:38 7.2M 
[   ]D1T1 - Secret Scanning in Open Source at Scale - Danish Tariq & Hassan Khan Yusufzai.pdf2024-09-01 09:40 7.4M 
[   ]D2 COMMSEC - Words Have Meaning! Leveraging LLMs to Enhance Insider Threat Investigation Capabilities - Keggy the Keg.pdf2024-09-03 02:29 10M 
[   ]D2T1 - One SMS to Root Them All - Exposing Critical Threats in Millions of Connected Devices - Sergey Anufrienko & Alexander Kozlov.pdf2024-09-03 02:07 10M 
[   ]KEYNOTE 1 - The Modern CISO - Pepijn Kok.pdf2024-09-01 09:36 11M 
[   ]D1 COMMSEC - How Automated Malware Attribution Engines Work - Anton Belousov.pdf2024-09-01 10:07 12M 
[   ]D2T1 - Leveraging Request Smuggling For Authentication Bypass and Remote Code Execution - Adam Crosser.pdf2024-09-03 02:04 13M 
[   ]D1T1 - Silencing Spies - Revealing Microphone Nonlinear Behavior and Building an Ultrasonic Jammer - Hetian Shi & Qing Wang.pdf2024-09-01 09:39 14M 

Apache/2.4.54 (Ubuntu) Server at conference.hitb.org Port 443