Index of /files/hitbsecconf2018dxb/materials

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]CLOSING KEYNOTE - Blind Digital Signatures - Dr Manar Abu Talib and Dr Qassim Nasir.pdf2018-11-28 15:33 5.8M 
[   ]D1 BSIDES - Blockchain - The New Line of Defense - Ramy AlDamati.pdf2018-11-28 04:59 5.8M 
[   ]D1 BSIDES - Creating Custom Browser Extensions to Hunt Low Hanging Fruits - Rewanth Cool.pdf2018-11-28 03:56 928K 
[   ]D1 BSIDES - Cyber Security of the Future - Dr Bushra AlBelooshi.pdf2018-11-28 04:22 5.5M 
[   ]D1 COMMSEC - Building Security Beyond The Genesis Block - Ryan Shepherd.pdf2018-11-28 04:04 5.4M 
[   ]D1 COMMSEC - Building Your Own Self Driving, Self Racing Car - Dhillon Kannabhiran.pdf2018-11-28 04:28 3.1M 
[   ]D1 COMMSEC - Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding - Vikash Yadav.pdf2018-11-28 04:43 5.4M 
[   ]D1 COMMSEC - Hacking Yachts Remotely - IoT Hacking at Sea - Stephan Gerling.pdf2018-11-28 03:59 3.0M 
[   ]D1 COMMSEC - Hacking into Broadband and Broadcast TV Systems - Chaouki Kasmi, Thomas Sabono and Pierre Barre.pdf2018-11-28 04:06 1.6M 
[   ]D1 COMMSEC - Hacking the 0day Market - Andrea Zapparoli Manzoni.pdf2018-11-28 03:50 4.3M 
[   ]D1 COMMSEC - System-level Threats - Dangerous Assumptions in Modern Product Security - Cristofaro Mune.pdf2018-11-28 09:20 1.8M 
[   ]D1 COMMSEC - Taking Over Telecom Networks - Loay Hassan Abdelrazak and Hardik Mehta.pdf2018-12-02 21:12 4.4M 
[   ]D1 KEYNOTE - Crouching Tiger Sudden Keynote - Katie Moussouris.pdf2018-11-28 03:48 4.1M 
[   ]D1T1 - AI Model Security - Reverse Engineering Machine Learning Models - Kang Li.pdf2018-11-28 04:10 14M 
[   ]D1T1 - Hunting for Backdoors in IoT Firmware at Unprecedented Scale - John Toterhi.pdf2018-11-28 04:08 4.0M 
[   ]D1T1 - Infecting Files On The Fly - Leonardo Nve.pdf2018-11-28 03:54 7.3M 
[   ]D1T1 - Rooting Routers Using Symbolic Execution - Mathy Vanhoef.pdf2018-11-28 04:33 1.7M 
[   ]D1T1 - The Phantom Menace- Intel ME Manufacturing Mode - Maxim Goryachy and Mark Ermolov.pdf2018-11-28 04:22 22M 
[   ]D1T1 - Virtualizing IoT With Code Coverage Guided Fuzzing - Lau Kai Jern and Nguyen Anh Quynh.pdf2018-11-28 03:52 8.6M 
[   ]D1T2 - A Multidimensional Hardware Attack and Defense Tool Set - Kunzhe Chai, Jie Fu and Mingchuang Qin.pdf2018-11-28 04:53 6.3M 
[   ]D1T2 - Cloudy With a Chance of Messages - Extracting Messages from iCloud - Vladimir Katalov.pdf2018-11-28 04:25 13M 
[   ]D1T2 - Gold Digging - Discovering Hidden Gems in APKs - Marc Schoenefeld.pdf2018-11-28 04:40 8.7M 
[   ]D1T2 - Hacking Telephone Systems for Fun and Profit - Himanshu Mehta and Sachin Wagh.pdf2018-11-28 04:18 28M 
[   ]D1T2 - IPv666 – Address of the Beast - Marc Newlin and Chris Grayson.pdf2018-11-28 04:40 2.3M 
[   ]D1T2 - IoT Woodpecker - Intrusion-Detection On The Hardware Bus - Congyuan Xu.pdf2018-11-28 04:36 7.7M 
[   ]D2 BSIDES - Growth Hacking Your Community - Dr Marwan Al-Zarouni.pdf2018-11-28 10:23 9.2M 
[   ]D2 BSIDES - Hunting Threats in Your Enterprise - Abdulrahman Alnimari.pdf2018-11-28 10:25 21M 
[   ]D2 BSIDES - My Experience of Running CTF Competitions in 7 Arab Countries - Moataz Salah.pdf2018-11-28 09:05 3.5M 
[   ]D2 BSIDES - Women in Cybersecurity - Heide Young.pdf2018-11-28 09:04 13M 
[   ]D2 COMMSEC - A Secured and Robust Wireless Communication System for Low-Latency Applications - Dr Husameldin Mukhtar.pdf2018-11-28 12:03 21M 
[   ]D2 COMMSEC - Evolution of Security Threats to Telecommunications Infrastructures - Emmanuel Gadaix.pdf2018-11-28 10:28 27M 
[   ]D2 COMMSEC - HWallet - The Simple Cryptocurrency Hardware Wallet - Nemanja Nikodijevic.pdf2018-11-28 12:02 576K 
[   ]D2 COMMSEC - Hacking the International RFQ Process - Dino Covotsos.pdf2018-11-28 15:17 4.1M 
[   ]D2 COMMSEC - Improved Blockchain Infrastructure with IoT - Dr Manar Abu Talib and Dr Qassim Nasir.pdf2018-11-28 15:26 19M 
[   ]D2 COMMSEC - Offensive Memory Forensics - Hugo Teso.pdf2018-11-28 11:10 30M 
[   ]D2 KEYNOTE - Cyber Arms Race - Mikko Hypponen.pdf2018-11-28 12:22 3.9M 
[   ]D2T1 - DHCP is Hard - Felix Wilhelm.pdf2018-11-28 08:43 422K 
[   ]D2T1 - GLitch Chronicles - Turning WebGL Into A Hammer - Pietro Frigo.pdf2018-11-28 12:05 27M 
[   ]D2T1 - Horror On The Bus - Hacking COMBUS - Kirils Solovjovs.pdf2018-11-28 08:43 6.7M 
[   ]D2T1 - It WISN’t Me - Attacking Industrial Wireless Mesh Networks - Mattijs van Ommeren and Erwin Patternote.pdf2018-11-28 11:19 1.8M 
[   ]D2T1 - Vote of No Confidence - Second Factor Correctness - Victor Mateu.pdf2018-11-28 15:48 2.6M 
[   ]D2T2 - Are You Listening? Auditable & Provable Privacy of Smart Speakers - Wang Kang and Yang Bo.pdf2018-11-28 08:56 12M 
[   ]D2T2 - Back On The Chain Gang - Blockchain, Public Chain and Contract Security - Li Jiafeng and Yang Changcheng.pdf2018-11-28 08:51 18M 
[   ]D2T2 - Capture This - Real Time Packet Processing with FPGAs - Matteo Collura.pdf2018-11-28 11:25 5.2M 
[   ]D2T2 - NTLM Relay Is Dead Long Live NTLM Relay - Jianing Wang and Junyu Zhou.pdf2018-11-28 12:09 26M 
[   ]D2T2 - Using Machine-Learning to Investigate Web Campaigns at Large - Federico Maggi.pdf2018-11-28 15:17 10M 

Apache/2.4.54 (Ubuntu) Server at conference.hitb.org Port 443