Index of /hitbsecconf2014kul/materials

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]D1T1 - Ryan Lackey and Marc Rogers - How a Helpful Man in the Middle Can Help You Evade Monitoring.pdf2017-10-14 22:03 1.0M 
[   ]D2T1 - Marc Rogers - Giving ApplePay the Finger.pdf2017-10-14 22:03 2.7M 
[   ]D2T1 - Haroon Meer Azhar Desai and Marco Slaviero - Weapons of Mass Distraction.pdf2017-10-14 22:03 55M 
[   ]D1T1 - The Grugq - OPSEC in the Age of Egotistical Giraffe.pdf2017-10-14 22:03 12M 
[   ]D2T2 - Paul S. Ziegler - Image Hoster Diving.pdf2017-10-14 22:03 12M 
[   ]D2T1 - Andrei Costin - Fireworks, Embedded Wireless and Insecurity-by-Design.pdf2017-10-14 22:03 15M 
[   ]D2T3 - F. Yarochkin V. Kropotov and V. Chetvertakov - Identifying Threats in Raw Data Events (Part 1 and 2).pdf2017-10-14 22:03 9.1M 
[   ]D1T2 - Alban Diquet - The Truth About Apples Multipeer Connectivity Framework.pdf2017-10-14 22:03 4.1M 
[   ]D2T2 - Mike Ryan - NSA Playset Bluetooth Smart.pdf2017-10-14 22:03 941K 
[   ]D1T3 - D. Dahl and C. Pedersen - Multi-User Encrypted Communication with No Trust in the Server.pdf2017-10-14 22:03 333K 
[   ]D1T1 - SENTER Sandman - Using Intel TXT to Attack BIOSes.pdf2017-10-14 22:03 6.7M 
[   ]D2T2 - Chris Liu and Matthew Lionetti - TackyDroid.pdf2017-10-14 22:03 13M 
[   ]D2T1 - Ben Nagy - ALPC Fuzzing Toolkit.pdf2017-10-14 22:03 2.7M 
[   ]D1T2 - Kallenberg, Kovah, Butterworth and Cornwell - Extreme Privilege Escalation.pdf2017-10-14 22:03 12M 
[   ]KEYNOTE 2 - Katie Moussouris - Into the Dark Ages or on to the Renaissance.pdf2017-10-14 22:03 3.5M 
[   ]D1T2 - Stefano Zanero - Automatic Scalable Extraction of Malicious Behaviours.pdf2017-10-14 22:03 1.6M 
[   ]D2T1 - Dominic Chell - Breaking Secure Mobile Applications.pdf2017-10-14 22:03 3.4M 
[   ]D1T2 - Andrea Barisani - Forging the USB Armory.pdf2017-10-14 22:03 8.4M 
[   ]D1T2 - Richard Johnson - Fuzzing and Patch Analysis - SAGEly Advice.pdf2017-10-14 22:03 831K 
[   ]D1T3 - Cem Gurkok - Tracing Bits of Coin in Disk and Memory.pdf2017-10-14 22:03 5.7M 
[   ]D2T2 - Rosario Valotta - Browser Fuzzing in 2014.pdf2017-10-14 22:03 5.0M 
[   ]D1T3 - A. Quint and F. Lone-Sang - IRMA - An Open Source Incident Response and Malware Analysis Platform.pdf2017-10-14 22:03 3.6M 
[   ]D1T2 - Michael Jordon - ARM Wrestling a Printer - How to Mod Firmware.pdf2017-10-14 22:03 36M 
[   ]D1T1 - Ross Bevington - How I Hacked my DSLR.pdf2017-10-14 22:03 139M 
[   ]KEYNOTE 1 - Nate Cardozo - The Next Crypto Wars or How We Never Learned to Stop Regulating Exports.pdf2017-10-14 22:03 11M 
[   ]D1T1 - Michele Spagnuolo - Abusing JSONP with Rosetta Flash.pdf2017-10-14 22:03 2.3M 
[   ]D1T1 - Filippo Valsorda - Exploiting ECDSA Failures in the Bitcoin Blockchain.pdf2017-10-14 22:03 4.7M 
[   ]CLOSING - Dhillon Kannabhiran - HITBSecWhat?.pdf2017-10-14 22:03 2.7M