Index of /files/hitblockdown002/materials

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]D1T1 - A Journey Into the Secret Flaws of In-DRAM RowHammer Mitigations - Emanuele Vannacci & Pietro Frigo.pdf2020-07-28 19:58 2.8M 
[   ]D1T1 - Breakout Script of the Westworld - Tianwen Tang & Wei Xiao.pdf2020-07-27 18:21 2.0M 
[   ]D1T1 - Clandestine Hunter - Two Strategies for Supply Chain Attack - Byeongjae Kim & Taewoo Lee.pdf2020-08-06 02:17 3.1M 
[   ]D1T1 - FIDLing with Decompilers - Carlos Garcia Prado & Ryan Warns.pdf2020-07-25 23:28 63M 
[   ]D1T1 - The Dojo of Blue - How Adversary Emulator Can Enhance Blue Team Performance - SHANG-DE Jiang.pdf2020-08-04 07:51 2.2M 
[   ]D1T1 - The Secret Codes Tell the Secrets - Zhang Qing & BaiGuang Dong.pdf2020-07-26 08:14 42M 
[   ]D1T1 - Zen - A Complex Campaign of Harmful Android Apps - Ɓukasz Siewierski.pdf2020-07-27 18:23 3.8M 
[   ]D1T2 - A DECEPTICON and AUTOBOT Walk Into a Bar- Python for Enhanced OPSEC - Joe Gray.pdf2020-07-25 09:32 6.7M 
[   ]D1T2 - Kernel Hijacking Is Not an Option - MemoryRanger Comes to the Rescue Again - Igor Korkin.pdf2020-08-02 19:22 2.4M 
[   ]D1T2 - Operation SemiChimera - APT Operation Targets Semiconductor Vendors - Bletchley Chen, Inndy Lin & SHANG-DE Jiang.pdf2020-08-02 19:17 5.3M 
[   ]D1 VIRTUAL LAB - Qiling Framework - Kaijern Lau.pdf2020-07-25 04:13 8.3M 
[   ]D1 VIRTUAL LAB - Signal Processing & GNU Radio - Ateet Kumar.pdf2020-07-27 18:21 2.2M 
[   ]D2T1 - Exploring Deficiencies in the State-of-the-art Automatic Software Vulnerability Mining Technologies - Wish Wu.pdf2020-07-26 08:09 35M 
[   ]D2T1 - Public and Private, Common Flaws in ICS Network Protocols - Mars Cheng & Selmon Yang.pdf2020-08-06 02:10 8.1M 
[   ]D2T1 - SAP RCE - The Agent Who Spoke Too Much - Yvan Genuer.pdf2020-07-26 08:09 3.6M 
[   ]D2T1 - The Weakest Element of Acquiring Bank Infrastructure - Ilia Bulatov & Gleb Cherbov.pdf2020-07-26 08:09 3.5M 
[   ]D2T2 - Quark Engine - An Obfuscation-Neglect Android Malware Scoring System - JunWei Song, KunYu Chen, IokJin Sih, AnWei Kung & Chung Hsin Chen.pdf2020-07-26 09:38 3.2M 
[   ]D2T2 - The Fragile Art of Edge Computing- Walk through Access Control Systems - Philippe Lin, Roel Reyes, Joey Costoya, Vincenzo Ciancaglini & Morton Swimmer.pdf2020-08-06 02:11 3.7M 
[   ]KEYNOTE 2 - DevSecOps, Chaos Security, and Not Being Left Behind - Eddie Schwartz.pdf2020-07-26 08:19 8.7M