| Name | Last modified | Size | Description |
|
| Parent Directory | | - | |
| D2 COMMSEC - Xabier-Ugarte Pedrero - PyREBox - Making Dynamic Instrumentation Great Again.pdf | 2018-04-23 07:06 | 3.6M | |
| D2T2 - Michele Spagnuolo & Lukas Weichselbaum - Defense-in-Depth Techniques for Modern Web Applications and Google’s Journey with CSP.pdf | 2018-04-17 13:49 | 1.3M | |
| D1 COMMSEC - Yann Allain - Practical Quantum Computing for Hackers Without a PhD.pdf | 2018-04-17 13:46 | 13M | |
| CLOSING KEYNOTE - Amber Baldet - Security is What We Make of It - Blockchain and Beyond.pdf | 2018-04-13 17:33 | 2.1M | |
| KEYNOTE 2 - Jennifer Leggio - A Risk Assessment of Logo Disclosures.pdf | 2018-04-13 17:33 | 24M | |
| D2 COMMSEC - Jeremy Brown - ProdSec - A Technical Approach.pdf | 2018-04-13 17:32 | 4.1M | |
| D2T1 - Philip Tsukerman - Expanding Your WMI Lateral Movement Arsenal.pdf | 2018-04-13 15:22 | 16M | |
| D2T3 - David Rodriguez, Jingchuan Chen & Dhia Mahjoub - Predicting Malicious Domains Using Convolutional Neural Networks.pdf | 2018-04-13 15:08 | 1.6M | |
| D2T2 - Fernando Arnaboldi - Exposing Hidden Exploitable Behaviors Using Extended Differential Fuzzing.pdf | 2018-04-13 14:32 | 3.9M | |
| D2T1 - Alfonso Munoz & Jorge Cuadrado - Establishing Covert Channels by Abusing GSM AT Commands.pdf | 2018-04-13 14:32 | 6.6M | |
| D1T2 - Bernhard Mueller - Smashing Ethereum Smart Contracts for Fun and ACTUAL Profit.pdf | 2018-04-13 14:25 | 2.0M | |
| D2 COMMSEC - Ben Schmidt - Smart Contract (in)security.pdf | 2018-04-13 14:16 | 3.8M | |
| D2 COMMSEC - Ricardo J. Rodriguez & Daniel Uroz - Automatic Generation of ROP Chains Using a Turing-Complete Instruction Set.pdf | 2018-04-13 13:33 | 1.4M | |
| D2 COMMSEC - Asaf Cohen & Ofir Kamil - Hacking a Hospital for Fun and Profit.pdf | 2018-04-13 13:32 | 3.5M | |
| D2T2 - Rogan Dawes - Towards a Generic Interecepting Proxy.pptx | 2018-04-13 13:23 | 27M | |
| D2T2 - Zhang Qing & Bai Guangdong - A New Fuzzing Method for Android.pdf | 2018-04-13 13:16 | 3.2M | |
| D2T1 - Sheila Ayelen Berta & Claudio Caracciolo - Backdooring & Remotely Controlling Cars With The Bicho.pdf | 2018-04-13 13:12 | 4.7M | |
| D2T2 - Rancho Han - Pwning The Windows Kernel.pdf | 2018-04-13 10:46 | 1.6M | |
| D2T3 - Jonathan Levin - Lend Me Your kernel_task Port.pdf | 2018-04-13 10:40 | 1.7M | |
| D2T1 - Karsten Nohl & Jakob Lell - Uncovering the Android Patch Gap Through Binary-Only Patch Level Analysis.pdf | 2018-04-13 10:40 | 2.5M | |
| WHITEPAPERS/ | 2018-04-13 10:05 | - | |
| D2 COMMSEC - Kyeong Joo Jung - Hiding Tasks via Hardware Task Switching.pdf | 2018-04-13 10:01 | 1.0M | |
| D2T1 - Aviv Grafi & Amit Dori - Sandbox Evasion Using VBA Referencing.pdf | 2018-04-13 09:30 | 1.3M | |
| D1T2 - Eugene Neyolov - Applying Machine Learning to User Behavior Anomaly Analysis.pdf | 2018-04-13 05:25 | 8.7M | |
| D1 COMMSEC - Stephen Hilt - Hacking IoT Speakers.pdf | 2018-04-12 17:09 | 75M | |
| D1T3 - Yunding Jian, Jie Fu & Chaoran Wang - Wireless Hacking with HackCUBE.pdf | 2018-04-12 17:07 | 1.8M | |
| D1T1 - Areum Lee & Jeonghoon Shin - Fuzzing Javascript Engines for Fun and Pwnage.pdf | 2018-04-12 17:04 | 4.6M | |
| D1 COMMSEC - Josh Stroschein - A Deep Dive Into Malicious Documents.pdf | 2018-04-12 16:45 | 15M | |
| D1T1 - Xiaolong Bai & Min Spark Zheng - How to Analyze and Find Bugs in MacOS and iOS Kernel Drivers.pdf | 2018-04-12 15:47 | 22M | |
| D1T2 - Yong Wang & Yang Song - Rooting Android 8 with a Kernel Space Mirroring Attack.pdf | 2018-04-12 15:47 | 9.0M | |
| D1 COMMSEC - Thomas Debize - Modern Pentest Tricks for Faster, Wider, Greater Engagements.pdf | 2018-04-12 15:39 | 1.3M | |
| D1T3 - Didier Stevens - SDR Lab.pdf | 2018-04-12 15:04 | 700K | |
| D1 COMMSEC - Kelvin Wong - How to Find and Exploit Bugs in IoT Devices.pdf | 2018-04-12 15:01 | 27M | |
| D1 COMMSEC - Steffen Wendzel - Steganography Ante Portas.pdf | 2018-04-12 14:50 | 63M | |
| D1T1 - V. Kropotov, F. Yarochkin, M. Fuentes, L. Gu - Abusing the Travel and Hospitality Industry for Profit.pdf | 2018-04-12 14:46 | 34M | |
| D1T3 - Maria Markstedter - From Zero to ARM Assembly Bind Shellcode.pdf | 2018-04-12 14:43 | 3.7M | |
| D1T2 - YuXiang Li, HuiYu Wu & Yong Yang - Hacking Intelligent Buildings - Pwning KNX & ZigBee Networks.pdf | 2018-04-12 14:41 | 15M | |
| D1 COMMSEC - Ofir Arkin - Creating an Isolated Data Center Security Policy Model Using SmartNICs.pdf | 2018-04-12 13:47 | 10M | |
| D1T2 - Daniel Bohannon - Invoke-DOSfuscation.pdf | 2018-04-12 13:42 | 6.5M | |
| D1 COMMSEC - Niels van Dijkhuizen - Keynterceptor - Press Any Key to Continue.pdf | 2018-04-12 13:42 | 3.2M | |
| D1T1 - Jun Li, Kunzhe Chai and Hongjian Cao - Ghost Tunnel- Covert Data Exfiltration Channel to Circumvent Air Gapping.pdf | 2018-04-12 13:03 | 6.0M | |
| D1T2 - Yu Hong and Shikang Xing - Attacking Microsoft’s .NET Framework Through CLR.pdf | 2018-04-12 11:09 | 3.2M | |
| D1 COMMSEC - Dhia Mahjoub and Sarah Brown - Privacy and Protection for Criminals - Behaviors and Patterns of Rogue Hosting Providers.pdf | 2018-04-12 11:06 | 2.6M | |
| D1T1 - Federico Dotta and Piergiovanni Cipolloni - Brida When Burp Suite Meets Frida.pdf | 2018-04-12 11:03 | 3.6M | |
| D1T1 - Don Bailey - Sneaky Element- Real World Attacks Against Secure Elements.pdf | 2018-04-12 09:48 | 2.3M | |
| D1 COMMSEC - Saif Elsherei and Ian Kronquist - The Life & Death of Kernel Object Abuse.pdf | 2018-04-12 09:33 | 2.0M | |
| KEYNOTE 1 - Marion Marschalek - The Future, The Past, and … Wait, Where the Hell are We Now.pdf | 2018-04-12 09:27 | 2.8M | |
| WELCOME ADDRESS - Michel van Eeten - Hacks, Sticks, and Carrots - Improving Incentives for Cybersecurity.pdf | 2018-04-12 07:13 | 3.3M | |
|