Index of /hitbsecconf2014kul/materials
Name
Last modified
Size
Description
Parent Directory
-
D1T3 - D. Dahl and C. Pedersen - Multi-User Encrypted Communication with No Trust in the Server.pdf
2017-10-14 22:03
333K
D1T2 - Richard Johnson - Fuzzing and Patch Analysis - SAGEly Advice.pdf
2017-10-14 22:03
831K
D2T2 - Mike Ryan - NSA Playset Bluetooth Smart.pdf
2017-10-14 22:03
941K
D1T1 - Ryan Lackey and Marc Rogers - How a Helpful Man in the Middle Can Help You Evade Monitoring.pdf
2017-10-14 22:03
1.0M
D1T2 - Stefano Zanero - Automatic Scalable Extraction of Malicious Behaviours.pdf
2017-10-14 22:03
1.6M
D1T1 - Michele Spagnuolo - Abusing JSONP with Rosetta Flash.pdf
2017-10-14 22:03
2.3M
CLOSING - Dhillon Kannabhiran - HITBSecWhat?.pdf
2017-10-14 22:03
2.7M
D2T1 - Marc Rogers - Giving ApplePay the Finger.pdf
2017-10-14 22:03
2.7M
D2T1 - Ben Nagy - ALPC Fuzzing Toolkit.pdf
2017-10-14 22:03
2.7M
D2T1 - Dominic Chell - Breaking Secure Mobile Applications.pdf
2017-10-14 22:03
3.4M
KEYNOTE 2 - Katie Moussouris - Into the Dark Ages or on to the Renaissance.pdf
2017-10-14 22:03
3.5M
D1T3 - A. Quint and F. Lone-Sang - IRMA - An Open Source Incident Response and Malware Analysis Platform.pdf
2017-10-14 22:03
3.6M
D1T2 - Alban Diquet - The Truth About Apples Multipeer Connectivity Framework.pdf
2017-10-14 22:03
4.1M
D1T1 - Filippo Valsorda - Exploiting ECDSA Failures in the Bitcoin Blockchain.pdf
2017-10-14 22:03
4.7M
D2T2 - Rosario Valotta - Browser Fuzzing in 2014.pdf
2017-10-14 22:03
5.0M
D1T3 - Cem Gurkok - Tracing Bits of Coin in Disk and Memory.pdf
2017-10-14 22:03
5.7M
D1T1 - SENTER Sandman - Using Intel TXT to Attack BIOSes.pdf
2017-10-14 22:03
6.7M
D1T2 - Andrea Barisani - Forging the USB Armory.pdf
2017-10-14 22:03
8.4M
D2T3 - F. Yarochkin V. Kropotov and V. Chetvertakov - Identifying Threats in Raw Data Events (Part 1 and 2).pdf
2017-10-14 22:03
9.1M
KEYNOTE 1 - Nate Cardozo - The Next Crypto Wars or How We Never Learned to Stop Regulating Exports.pdf
2017-10-14 22:03
11M
D1T2 - Kallenberg, Kovah, Butterworth and Cornwell - Extreme Privilege Escalation.pdf
2017-10-14 22:03
12M
D1T1 - The Grugq - OPSEC in the Age of Egotistical Giraffe.pdf
2017-10-14 22:03
12M
D2T2 - Paul S. Ziegler - Image Hoster Diving.pdf
2017-10-14 22:03
12M
D2T2 - Chris Liu and Matthew Lionetti - TackyDroid.pdf
2017-10-14 22:03
13M
D2T1 - Andrei Costin - Fireworks, Embedded Wireless and Insecurity-by-Design.pdf
2017-10-14 22:03
15M
D1T2 - Michael Jordon - ARM Wrestling a Printer - How to Mod Firmware.pdf
2017-10-14 22:03
36M
D2T1 - Haroon Meer Azhar Desai and Marco Slaviero - Weapons of Mass Distraction.pdf
2017-10-14 22:03
55M
D1T1 - Ross Bevington - How I Hacked my DSLR.pdf
2017-10-14 22:03
139M