Index of /files/hitblockdown002/materials

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]D1T1 - A Journey Into the Secret Flaws of In-DRAM RowHammer Mitigations - Emanuele Vannacci & Pietro Frigo.pdf2020-07-28 23:58 2.8M 
[   ]D1T1 - Breakout Script of the Westworld - Tianwen Tang & Wei Xiao.pdf2020-07-27 22:21 2.0M 
[   ]D1T1 - Clandestine Hunter - Two Strategies for Supply Chain Attack - Byeongjae Kim & Taewoo Lee.pdf2020-08-06 06:17 3.1M 
[   ]D1T1 - FIDLing with Decompilers - Carlos Garcia Prado & Ryan Warns.pdf2020-07-26 03:28 63M 
[   ]D1T1 - The Dojo of Blue - How Adversary Emulator Can Enhance Blue Team Performance - SHANG-DE Jiang.pdf2020-08-04 11:51 2.2M 
[   ]D1T1 - The Secret Codes Tell the Secrets - Zhang Qing & BaiGuang Dong.pdf2020-07-26 12:14 42M 
[   ]D1T1 - Zen - A Complex Campaign of Harmful Android Apps - Łukasz Siewierski.pdf2020-07-27 22:23 3.8M 
[   ]D1T2 - A DECEPTICON and AUTOBOT Walk Into a Bar- Python for Enhanced OPSEC - Joe Gray.pdf2020-07-25 13:32 6.7M 
[   ]D1T2 - From Authors of COMPFun: HTTP Statuses as C2 Commands and Compromised TLS - Denis Legezo.pdf2020-08-24 22:40 1.1M 
[   ]D1T2 - How to Hack Medical Imaging Applications via DICOM - Maria Nedyak.pdf2020-08-19 23:39 11M 
[   ]D1T2 - Kernel Hijacking Is Not an Option - MemoryRanger Comes to the Rescue Again - Igor Korkin.pdf2020-08-02 23:22 2.4M 
[   ]D1T2 - Operation SemiChimera - APT Operation Targets Semiconductor Vendors - Bletchley Chen, Inndy Lin & SHANG-DE Jiang.pdf2020-08-02 23:17 5.3M 
[   ]D1T2 - Serverless Security- Attack & Defense - Pawel Rzepa.pdf2020-08-24 22:36 2.9M 
[   ]D1 VIRTUAL LAB - Qiling Framework - Kaijern Lau.pdf2020-07-25 08:13 8.3M 
[   ]D1 VIRTUAL LAB - Signal Processing & GNU Radio - Ateet Kumar.pdf2020-07-27 22:21 2.2M 
[   ]D2T1 - Exploring Deficiencies in the State-of-the-art Automatic Software Vulnerability Mining Technologies - Wish Wu.pdf2020-07-26 12:09 35M 
[   ]D2T1 - Public and Private, Common Flaws in ICS Network Protocols - Mars Cheng & Selmon Yang.pdf2020-08-06 06:10 8.1M 
[   ]D2T1 - SAP RCE - The Agent Who Spoke Too Much - Yvan Genuer.pdf2020-07-26 12:09 3.6M 
[   ]D2T1 - The Weakest Element of Acquiring Bank Infrastructure - Ilia Bulatov & Gleb Cherbov.pdf2020-07-26 12:09 3.5M 
[   ]D2T2 - A Review of Modern Code Deobfuscation Techniques - Arnau Gamez Montolio.pdf2020-08-19 23:25 2.1M 
[   ]D2T2 - PEsidious – Create Mutated Evasive Malware Using Artificial Intelligence - Chandni Vaya & Bedang Sen.pdf2020-09-04 08:55 1.8M 
[   ]D2T2 - PayDay - Jackpotting Fortune-500 Treasuries - Martin Doyhenard & Gaston Traberg.pdf2020-08-24 22:52 7.3M 
[   ]D2T2 - Quark Engine - An Obfuscation-Neglect Android Malware Scoring System - JunWei Song, KunYu Chen, IokJin Sih, AnWei Kung & Chung Hsin Chen.pdf2020-07-26 13:38 3.2M 
[   ]D2T2 - The Fragile Art of Edge Computing- Walk through Access Control Systems - Philippe Lin, Roel Reyes, Joey Costoya, Vincenzo Ciancaglini & Morton Swimmer.pdf2020-08-06 06:11 3.7M 
[   ]KEYNOTE 1 - Hardware Security is Hard - How Hardware Boundaries Define Platform Security - Alex Matrosov.pdf2020-08-13 23:33 9.0M 
[   ]KEYNOTE 2 - DevSecOps, Chaos Security, and Not Being Left Behind - Eddie Schwartz.pdf2020-07-26 12:19 8.7M 

Apache/2.4.54 (Ubuntu) Server at conference.hitb.org Port 443