| Name | Last modified | Size | Description |
|
| Parent Directory | | - | |
| D1T1 - A Journey Into the Secret Flaws of In-DRAM RowHammer Mitigations - Emanuele Vannacci & Pietro Frigo.pdf | 2020-07-28 23:58 | 2.8M | |
| D1T1 - Breakout Script of the Westworld - Tianwen Tang & Wei Xiao.pdf | 2020-07-27 22:21 | 2.0M | |
| D1T1 - Clandestine Hunter - Two Strategies for Supply Chain Attack - Byeongjae Kim & Taewoo Lee.pdf | 2020-08-06 06:17 | 3.1M | |
| D1T1 - FIDLing with Decompilers - Carlos Garcia Prado & Ryan Warns.pdf | 2020-07-26 03:28 | 63M | |
| D1T1 - The Dojo of Blue - How Adversary Emulator Can Enhance Blue Team Performance - SHANG-DE Jiang.pdf | 2020-08-04 11:51 | 2.2M | |
| D1T1 - The Secret Codes Tell the Secrets - Zhang Qing & BaiGuang Dong.pdf | 2020-07-26 12:14 | 42M | |
| D1T1 - Zen - A Complex Campaign of Harmful Android Apps - Łukasz Siewierski.pdf | 2020-07-27 22:23 | 3.8M | |
| D1T2 - A DECEPTICON and AUTOBOT Walk Into a Bar- Python for Enhanced OPSEC - Joe Gray.pdf | 2020-07-25 13:32 | 6.7M | |
| D1T2 - From Authors of COMPFun: HTTP Statuses as C2 Commands and Compromised TLS - Denis Legezo.pdf | 2020-08-24 22:40 | 1.1M | |
| D1T2 - How to Hack Medical Imaging Applications via DICOM - Maria Nedyak.pdf | 2020-08-19 23:39 | 11M | |
| D1T2 - Kernel Hijacking Is Not an Option - MemoryRanger Comes to the Rescue Again - Igor Korkin.pdf | 2020-08-02 23:22 | 2.4M | |
| D1T2 - Operation SemiChimera - APT Operation Targets Semiconductor Vendors - Bletchley Chen, Inndy Lin & SHANG-DE Jiang.pdf | 2020-08-02 23:17 | 5.3M | |
| D1T2 - Serverless Security- Attack & Defense - Pawel Rzepa.pdf | 2020-08-24 22:36 | 2.9M | |
| D1 VIRTUAL LAB - Qiling Framework - Kaijern Lau.pdf | 2020-07-25 08:13 | 8.3M | |
| D1 VIRTUAL LAB - Signal Processing & GNU Radio - Ateet Kumar.pdf | 2020-07-27 22:21 | 2.2M | |
| D2T1 - Exploring Deficiencies in the State-of-the-art Automatic Software Vulnerability Mining Technologies - Wish Wu.pdf | 2020-07-26 12:09 | 35M | |
| D2T1 - Public and Private, Common Flaws in ICS Network Protocols - Mars Cheng & Selmon Yang.pdf | 2020-08-06 06:10 | 8.1M | |
| D2T1 - SAP RCE - The Agent Who Spoke Too Much - Yvan Genuer.pdf | 2020-07-26 12:09 | 3.6M | |
| D2T1 - The Weakest Element of Acquiring Bank Infrastructure - Ilia Bulatov & Gleb Cherbov.pdf | 2020-07-26 12:09 | 3.5M | |
| D2T2 - A Review of Modern Code Deobfuscation Techniques - Arnau Gamez Montolio.pdf | 2020-08-19 23:25 | 2.1M | |
| D2T2 - PEsidious – Create Mutated Evasive Malware Using Artificial Intelligence - Chandni Vaya & Bedang Sen.pdf | 2020-09-04 08:55 | 1.8M | |
| D2T2 - PayDay - Jackpotting Fortune-500 Treasuries - Martin Doyhenard & Gaston Traberg.pdf | 2020-08-24 22:52 | 7.3M | |
| D2T2 - Quark Engine - An Obfuscation-Neglect Android Malware Scoring System - JunWei Song, KunYu Chen, IokJin Sih, AnWei Kung & Chung Hsin Chen.pdf | 2020-07-26 13:38 | 3.2M | |
| D2T2 - The Fragile Art of Edge Computing- Walk through Access Control Systems - Philippe Lin, Roel Reyes, Joey Costoya, Vincenzo Ciancaglini & Morton Swimmer.pdf | 2020-08-06 06:11 | 3.7M | |
| KEYNOTE 1 - Hardware Security is Hard - How Hardware Boundaries Define Platform Security - Alex Matrosov.pdf | 2020-08-13 23:33 | 9.0M | |
| KEYNOTE 2 - DevSecOps, Chaos Security, and Not Being Left Behind - Eddie Schwartz.pdf | 2020-07-26 12:19 | 8.7M | |
|