Index of /hitbsecconf2015ams/materials/Whitepapers

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]Uncovering Secret Connections Among Attackers by Using Network Theory and Custom Honeypots.pdf2017-10-14 21:59 804K 
[   ]The illusoryTLS Asymmetric Backdoor.pdf2017-10-14 21:59 81K 
[   ]Reversing Proprietary SCADA Tech.pdf2017-10-14 21:59 1.9M 
[   ]Remotely Owning Secure Parking Systems.pdf2017-10-14 21:59 2.0M 
[   ]Relay Attacks in EMV Contactless Cards with Android OTS Devices.pdf2017-10-14 21:59 370K 
[   ]Oracle PeopleSoft applications are under attack.pdf2017-10-14 21:59 455K 
[   ]Mobile SSL Failures.pdf2017-10-14 21:59 132K 
[   ]Mobile Authentication Subspace Travel.pdf2017-10-14 21:59 192K 
[   ]Memory Forensics for Cisco IOS.pdf2017-10-14 21:59 329K 
[   ]IRMA Framework for Incident Response & Malware Analysis.pdf2017-10-14 21:59 679K 
[   ]How Many Million BIOSes Would You Like To Infect.pdf2017-10-14 21:59 2.9M 
[   ]Hacking Tizen - The OS of Everything.pdf2017-10-14 21:59 1.4M 
[   ]Fuzzing Objects d’ART.pdf2017-10-14 21:59 1.7M 
[   ]Exploiting Browsers the Logical Way.pdf2017-10-14 21:59 550K 
[   ]Eight ou Two Mobile.pdf2017-10-14 21:59 411K