Index of /files/hitbsecconf2018ams/materials

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]D1 COMMSEC - Stephen Hilt - Hacking IoT Speakers.pdf2018-04-12 13:09 75M 
[   ]D1 COMMSEC - Steffen Wendzel - Steganography Ante Portas.pdf2018-04-12 10:50 63M 
[   ]D1T1 - V. Kropotov, F. Yarochkin, M. Fuentes, L. Gu - Abusing the Travel and Hospitality Industry for Profit.pdf2018-04-12 10:46 34M 
[   ]D1 COMMSEC - Kelvin Wong - How to Find and Exploit Bugs in IoT Devices.pdf2018-04-12 11:01 27M 
[   ]D2T2 - Rogan Dawes - Towards a Generic Interecepting Proxy.pptx2018-04-13 09:23 27M 
[   ]KEYNOTE 2 - Jennifer Leggio - A Risk Assessment of Logo Disclosures.pdf2018-04-13 13:33 24M 
[   ]D1T1 - Xiaolong Bai & Min Spark Zheng - How to Analyze and Find Bugs in MacOS and iOS Kernel Drivers.pdf2018-04-12 11:47 22M 
[   ]D2T1 - Philip Tsukerman - Expanding Your WMI Lateral Movement Arsenal.pdf2018-04-13 11:22 16M 
[   ]D1 COMMSEC - Josh Stroschein - A Deep Dive Into Malicious Documents.pdf2018-04-12 12:45 15M 
[   ]D1T2 - YuXiang Li, HuiYu Wu & Yong Yang - Hacking Intelligent Buildings - Pwning KNX & ZigBee Networks.pdf2018-04-12 10:41 15M 
[   ]D1 COMMSEC - Yann Allain - Practical Quantum Computing for Hackers Without a PhD.pdf2018-04-17 09:46 13M 
[   ]D1 COMMSEC - Ofir Arkin - Creating an Isolated Data Center Security Policy Model Using SmartNICs.pdf2018-04-12 09:47 10M 
[   ]D1T2 - Yong Wang & Yang Song - Rooting Android 8 with a Kernel Space Mirroring Attack.pdf2018-04-12 11:47 9.0M 
[   ]D1T2 - Eugene Neyolov - Applying Machine Learning to User Behavior Anomaly Analysis.pdf2018-04-13 01:25 8.7M 
[   ]D2T1 - Alfonso Munoz & Jorge Cuadrado - Establishing Covert Channels by Abusing GSM AT Commands.pdf2018-04-13 10:32 6.6M 
[   ]D1T2 - Daniel Bohannon - Invoke-DOSfuscation.pdf2018-04-12 09:42 6.5M 
[   ]D1T1 - Jun Li, Kunzhe Chai and Hongjian Cao - Ghost Tunnel- Covert Data Exfiltration Channel to Circumvent Air Gapping.pdf2018-04-12 09:03 6.0M 
[   ]D2T1 - Sheila Ayelen Berta & Claudio Caracciolo - Backdooring & Remotely Controlling Cars With The Bicho.pdf2018-04-13 09:12 4.7M 
[   ]D1T1 - Areum Lee & Jeonghoon Shin - Fuzzing Javascript Engines for Fun and Pwnage.pdf2018-04-12 13:04 4.6M 
[   ]D2 COMMSEC - Jeremy Brown - ProdSec - A Technical Approach.pdf2018-04-13 13:32 4.1M 
[   ]D2T2 - Fernando Arnaboldi - Exposing Hidden Exploitable Behaviors Using Extended Differential Fuzzing.pdf2018-04-13 10:32 3.9M 
[   ]D2 COMMSEC - Ben Schmidt - Smart Contract (in)security.pdf2018-04-13 10:16 3.8M 
[   ]D1T3 - Maria Markstedter - From Zero to ARM Assembly Bind Shellcode.pdf2018-04-12 10:43 3.7M 
[   ]D1T1 - Federico Dotta and Piergiovanni Cipolloni - Brida When Burp Suite Meets Frida.pdf2018-04-12 07:03 3.6M 
[   ]D2 COMMSEC - Xabier-Ugarte Pedrero - PyREBox - Making Dynamic Instrumentation Great Again.pdf2018-04-23 03:06 3.6M 
[   ]D2 COMMSEC - Asaf Cohen & Ofir Kamil - Hacking a Hospital for Fun and Profit.pdf2018-04-13 09:32 3.5M 
[   ]WELCOME ADDRESS - Michel van Eeten - Hacks, Sticks, and Carrots - Improving Incentives for Cybersecurity.pdf2018-04-12 03:13 3.3M 
[   ]D1 COMMSEC - Niels van Dijkhuizen - Keynterceptor - Press Any Key to Continue.pdf2018-04-12 09:42 3.2M 
[   ]D2T2 - Zhang Qing & Bai Guangdong - A New Fuzzing Method for Android.pdf2018-04-13 09:16 3.2M 
[   ]D1T2 - Yu Hong and Shikang Xing - Attacking Microsoft’s .NET Framework Through CLR.pdf2018-04-12 07:09 3.2M 
[   ]KEYNOTE 1 - Marion Marschalek - The Future, The Past, and … Wait, Where the Hell are We Now.pdf2018-04-12 05:27 2.8M 
[   ]D1 COMMSEC - Dhia Mahjoub and Sarah Brown - Privacy and Protection for Criminals - Behaviors and Patterns of Rogue Hosting Providers.pdf2018-04-12 07:06 2.6M 
[   ]D2T1 - Karsten Nohl & Jakob Lell - Uncovering the Android Patch Gap Through Binary-Only Patch Level Analysis.pdf2018-04-13 06:40 2.5M 
[   ]D1T1 - Don Bailey - Sneaky Element- Real World Attacks Against Secure Elements.pdf2018-04-12 05:48 2.3M 
[   ]CLOSING KEYNOTE - Amber Baldet - Security is What We Make of It - Blockchain and Beyond.pdf2018-04-13 13:33 2.1M 
[   ]D1 COMMSEC - Saif Elsherei and Ian Kronquist - The Life & Death of Kernel Object Abuse.pdf2018-04-12 05:33 2.0M 
[   ]D1T2 - Bernhard Mueller - Smashing Ethereum Smart Contracts for Fun and ACTUAL Profit.pdf2018-04-13 10:25 2.0M 
[   ]D1T3 - Yunding Jian, Jie Fu & Chaoran Wang - Wireless Hacking with HackCUBE.pdf2018-04-12 13:07 1.8M 
[   ]D2T3 - Jonathan Levin - Lend Me Your kernel_task Port.pdf2018-04-13 06:40 1.7M 
[   ]D2T2 - Rancho Han - Pwning The Windows Kernel.pdf2018-04-13 06:46 1.6M 
[   ]D2T3 - David Rodriguez, Jingchuan Chen & Dhia Mahjoub - Predicting Malicious Domains Using Convolutional Neural Networks.pdf2018-04-13 11:08 1.6M 
[   ]D2 COMMSEC - Ricardo J. Rodriguez & Daniel Uroz - Automatic Generation of ROP Chains Using a Turing-Complete Instruction Set.pdf2018-04-13 09:33 1.4M 
[   ]D2T1 - Aviv Grafi & Amit Dori - Sandbox Evasion Using VBA Referencing.pdf2018-04-13 05:30 1.3M 
[   ]D1 COMMSEC - Thomas Debize - Modern Pentest Tricks for Faster, Wider, Greater Engagements.pdf2018-04-12 11:39 1.3M 
[   ]D2T2 - Michele Spagnuolo & Lukas Weichselbaum - Defense-in-Depth Techniques for Modern Web Applications and Google’s Journey with CSP.pdf2018-04-17 09:49 1.3M 
[   ]D2 COMMSEC - Kyeong Joo Jung - Hiding Tasks via Hardware Task Switching.pdf2018-04-13 06:01 1.0M 
[   ]D1T3 - Didier Stevens - SDR Lab.pdf2018-04-12 11:04 700K 
[DIR]WHITEPAPERS/2018-04-13 06:05 -