Index of /hitbsecconf2013kul/materials

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]D2 KEYNOTE - Joe Sullivan - Bringing Social to Security - NO SLIDES.pdf2014-06-19 23:46 0  
[   ]D1T1 - Collin Mulliner - Android DDI - Dynamic Dalvik Instrumentation of Android Applications.pdf2014-06-19 23:46 854K 
[   ]D1T2 - Mariano Graziano and Andrea Lanzi - How Actaeon Unveils Your Hypervisor.pdf2014-06-19 23:46 1.0M 
[   ]D2T1 - Mark Vincent Yason - Diving Into IE10's Enhanced Protected Mode Sandbox.pdf2014-06-19 23:46 1.0M 
[   ]D1T2 - Francisco - Owning a Cisco VoIP Environment.pdf2014-06-19 23:46 1.3M 
[   ]D1T1 - Kallenberg, Kovah, Butterworth - Defeating Signed BIOS Enforcement.pdf2014-06-19 23:46 1.3M 
[   ]D1T2 - Andy Davis - Deriving Intelligence from USB Stack Interactions.pdf2014-06-19 23:46 1.4M 
[   ]D2T2 - Victor van der Veen - A Fast and Complete Android Method Tracer.pdf2014-06-19 23:46 1.6M 
[   ]D2T1 - James Forshaw - Exploiting XML Digital Signature Implementations.pdf2014-06-19 23:46 1.7M 
[   ]D2T3 - Job de Haas - 20 Ways Past Secure Boot.pdf2014-06-19 23:46 1.8M 
[   ]D2T1 - Joshua 'p0sixninja' Hill - SHAttered Dreams.pdf2014-06-19 23:46 2.1M 
[   ]D1T3 - Wes Brown - Malware Analysis Using Visualization.pdf2014-06-19 23:46 2.4M 
[   ]D2T2 - Stefano Zanero - Tracking and Characterizing Botnets Using Automatically Generated Domains.pdf2014-06-19 23:46 2.4M 
[   ]D2T2 - Rahul Sasi - Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis.pdf2014-06-19 23:46 2.6M 
[   ]D2T2 - Stefan Esser - Tales from iOS 6 Exploitation and iOS 7 Security Changes.pdf2014-06-19 23:46 2.9M 
[   ]D1T3 - Mike Shema - CSRF Lab.pdf2014-06-19 23:46 2.9M 
[   ]D1 KEYNOTE - Andy Ellis - Cognitive Injection.pdf2014-06-19 23:46 4.2M 
[   ]D1T1 - Dominic Chell and Shaun Colley - Practical Attacks Against Encrypted VoIP Communications.pdf2014-06-19 23:46 4.9M 
[   ]D2T3 - Keith Lee and Jonathan Werrett - Facebook OSINT.pdf2014-06-19 23:46 5.2M 
[   ]D1T2 - Adam Laurie - RFIDler - Software Defined RFID Reader Writer Emulator.pdf2014-06-19 23:46 5.7M 
[   ]D2T3 - Eric Michaud and Ryan Lackey - Thwarting Evil Maid Attacks.pdf2014-06-19 23:46 6.9M 
[   ]D2T1 - Cyril 'pod2g' Cattiaux and GG - How Apple Can Read Your iMessages.pdf2014-06-19 23:46 7.6M 
[   ]D1T3 - Cem Gurkok - Hunting for OS X Rootkits in Memory.pdf2014-06-19 23:46 7.8M 
[   ]D2T2 - Vladimir Katalov - Cracking and Analyzing Apple's iCloud Protocol.pdf2014-06-19 23:46 7.8M 
[   ]D1T2 - Mathias Morbitzer - TCP Idle Scans in IPv6.pdf2014-06-19 23:46 8.0M 
[   ]D1T1 - Marco Balduzzi, Kyle Wilhoit Alessandro Pasta - Attacking Vessel Tracking Systems for Fun and Profit.pdf2014-06-19 23:46 9.0M 
[   ]D1T3 BONUS TALK - Marc Rogers - Why I Hacked TouchID and Still Think It's Awesome.pdf2014-06-19 23:46 9.9M 
[   ]D1T2 - Joaquim Espinhara and Ulisses Alburquerque - Using Online Activity as Digital DNA.pdf2014-06-19 23:46 9.9M 
[   ]D2T3 - Ashar Javad - Trusted Friend Attack.pdf2014-06-19 23:46 15M 
[   ]D2T3 - Luiz Eduardo and Joaquim Espinhara - Lost in Translation.pdf2014-06-19 23:46 16M 
[   ]D2T1 - Hugo Teso - Digging Deeper Into Aviation Security.pdf2014-06-19 23:46 17M 
[   ]D1T1 - Peter 'bl4sty' Geissler - Demystifying Game Console Security.pdf2014-06-19 23:46 20M 
[   ]D1T1 - Gianni Gnesa - Hacking Corporations Using Unconventional Chained Exploits.pdf2014-06-19 23:46 54M 

Apache/2.4.7 (Ubuntu) Server at conference.hitb.org Port 80