Index of /hitbsecconf2015ams/materials/Whitepapers
Name
Last modified
Size
Description
Parent Directory
-
Eight ou Two Mobile.pdf
2017-10-14 21:59
411K
Exploiting Browsers the Logical Way.pdf
2017-10-14 21:59
550K
Fuzzing Objects d’ART.pdf
2017-10-14 21:59
1.7M
Hacking Tizen - The OS of Everything.pdf
2017-10-14 21:59
1.4M
How Many Million BIOSes Would You Like To Infect.pdf
2017-10-14 21:59
2.9M
IRMA Framework for Incident Response & Malware Analysis.pdf
2017-10-14 21:59
679K
Memory Forensics for Cisco IOS.pdf
2017-10-14 21:59
329K
Mobile Authentication Subspace Travel.pdf
2017-10-14 21:59
192K
Mobile SSL Failures.pdf
2017-10-14 21:59
132K
Oracle PeopleSoft applications are under attack.pdf
2017-10-14 21:59
455K
Relay Attacks in EMV Contactless Cards with Android OTS Devices.pdf
2017-10-14 21:59
370K
Remotely Owning Secure Parking Systems.pdf
2017-10-14 21:59
2.0M
Reversing Proprietary SCADA Tech.pdf
2017-10-14 21:59
1.9M
The illusoryTLS Asymmetric Backdoor.pdf
2017-10-14 21:59
81K
Uncovering Secret Connections Among Attackers by Using Network Theory and Custom Honeypots.pdf
2017-10-14 21:59
804K