Index of /files/hitbsecconf2018dxb/materials
Name
Last modified
Size
Description
Parent Directory
-
CLOSING KEYNOTE - Blind Digital Signatures - Dr Manar Abu Talib and Dr Qassim Nasir.pdf
2018-11-28 15:33
5.8M
D1 BSIDES - Blockchain - The New Line of Defense - Ramy AlDamati.pdf
2018-11-28 04:59
5.8M
D1 BSIDES - Creating Custom Browser Extensions to Hunt Low Hanging Fruits - Rewanth Cool.pdf
2018-11-28 03:56
928K
D1 BSIDES - Cyber Security of the Future - Dr Bushra AlBelooshi.pdf
2018-11-28 04:22
5.5M
D1 COMMSEC - Building Security Beyond The Genesis Block - Ryan Shepherd.pdf
2018-11-28 04:04
5.4M
D1 COMMSEC - Building Your Own Self Driving, Self Racing Car - Dhillon Kannabhiran.pdf
2018-11-28 04:28
3.1M
D1 COMMSEC - Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding - Vikash Yadav.pdf
2018-11-28 04:43
5.4M
D1 COMMSEC - Hacking Yachts Remotely - IoT Hacking at Sea - Stephan Gerling.pdf
2018-11-28 03:59
3.0M
D1 COMMSEC - Hacking into Broadband and Broadcast TV Systems - Chaouki Kasmi, Thomas Sabono and Pierre Barre.pdf
2018-11-28 04:06
1.6M
D1 COMMSEC - Hacking the 0day Market - Andrea Zapparoli Manzoni.pdf
2018-11-28 03:50
4.3M
D1 COMMSEC - System-level Threats - Dangerous Assumptions in Modern Product Security - Cristofaro Mune.pdf
2018-11-28 09:20
1.8M
D1 COMMSEC - Taking Over Telecom Networks - Loay Hassan Abdelrazak and Hardik Mehta.pdf
2018-12-02 21:12
4.4M
D1 KEYNOTE - Crouching Tiger Sudden Keynote - Katie Moussouris.pdf
2018-11-28 03:48
4.1M
D1T1 - AI Model Security - Reverse Engineering Machine Learning Models - Kang Li.pdf
2018-11-28 04:10
14M
D1T1 - Hunting for Backdoors in IoT Firmware at Unprecedented Scale - John Toterhi.pdf
2018-11-28 04:08
4.0M
D1T1 - Infecting Files On The Fly - Leonardo Nve.pdf
2018-11-28 03:54
7.3M
D1T1 - Rooting Routers Using Symbolic Execution - Mathy Vanhoef.pdf
2018-11-28 04:33
1.7M
D1T1 - The Phantom Menace- Intel ME Manufacturing Mode - Maxim Goryachy and Mark Ermolov.pdf
2018-11-28 04:22
22M
D1T1 - Virtualizing IoT With Code Coverage Guided Fuzzing - Lau Kai Jern and Nguyen Anh Quynh.pdf
2018-11-28 03:52
8.6M
D1T2 - A Multidimensional Hardware Attack and Defense Tool Set - Kunzhe Chai, Jie Fu and Mingchuang Qin.pdf
2018-11-28 04:53
6.3M
D1T2 - Cloudy With a Chance of Messages - Extracting Messages from iCloud - Vladimir Katalov.pdf
2018-11-28 04:25
13M
D1T2 - Gold Digging - Discovering Hidden Gems in APKs - Marc Schoenefeld.pdf
2018-11-28 04:40
8.7M
D1T2 - Hacking Telephone Systems for Fun and Profit - Himanshu Mehta and Sachin Wagh.pdf
2018-11-28 04:18
28M
D1T2 - IPv666 – Address of the Beast - Marc Newlin and Chris Grayson.pdf
2018-11-28 04:40
2.3M
D1T2 - IoT Woodpecker - Intrusion-Detection On The Hardware Bus - Congyuan Xu.pdf
2018-11-28 04:36
7.7M
D2 BSIDES - Growth Hacking Your Community - Dr Marwan Al-Zarouni.pdf
2018-11-28 10:23
9.2M
D2 BSIDES - Hunting Threats in Your Enterprise - Abdulrahman Alnimari.pdf
2018-11-28 10:25
21M
D2 BSIDES - My Experience of Running CTF Competitions in 7 Arab Countries - Moataz Salah.pdf
2018-11-28 09:05
3.5M
D2 BSIDES - Women in Cybersecurity - Heide Young.pdf
2018-11-28 09:04
13M
D2 COMMSEC - A Secured and Robust Wireless Communication System for Low-Latency Applications - Dr Husameldin Mukhtar.pdf
2018-11-28 12:03
21M
D2 COMMSEC - Evolution of Security Threats to Telecommunications Infrastructures - Emmanuel Gadaix.pdf
2018-11-28 10:28
27M
D2 COMMSEC - HWallet - The Simple Cryptocurrency Hardware Wallet - Nemanja Nikodijevic.pdf
2018-11-28 12:02
576K
D2 COMMSEC - Hacking the International RFQ Process - Dino Covotsos.pdf
2018-11-28 15:17
4.1M
D2 COMMSEC - Improved Blockchain Infrastructure with IoT - Dr Manar Abu Talib and Dr Qassim Nasir.pdf
2018-11-28 15:26
19M
D2 COMMSEC - Offensive Memory Forensics - Hugo Teso.pdf
2018-11-28 11:10
30M
D2 KEYNOTE - Cyber Arms Race - Mikko Hypponen.pdf
2018-11-28 12:22
3.9M
D2T1 - DHCP is Hard - Felix Wilhelm.pdf
2018-11-28 08:43
422K
D2T1 - GLitch Chronicles - Turning WebGL Into A Hammer - Pietro Frigo.pdf
2018-11-28 12:05
27M
D2T1 - Horror On The Bus - Hacking COMBUS - Kirils Solovjovs.pdf
2018-11-28 08:43
6.7M
D2T1 - It WISN’t Me - Attacking Industrial Wireless Mesh Networks - Mattijs van Ommeren and Erwin Patternote.pdf
2018-11-28 11:19
1.8M
D2T1 - Vote of No Confidence - Second Factor Correctness - Victor Mateu.pdf
2018-11-28 15:48
2.6M
D2T2 - Are You Listening? Auditable & Provable Privacy of Smart Speakers - Wang Kang and Yang Bo.pdf
2018-11-28 08:56
12M
D2T2 - Back On The Chain Gang - Blockchain, Public Chain and Contract Security - Li Jiafeng and Yang Changcheng.pdf
2018-11-28 08:51
18M
D2T2 - Capture This - Real Time Packet Processing with FPGAs - Matteo Collura.pdf
2018-11-28 11:25
5.2M
D2T2 - NTLM Relay Is Dead Long Live NTLM Relay - Jianing Wang and Junyu Zhou.pdf
2018-11-28 12:09
26M
D2T2 - Using Machine-Learning to Investigate Web Campaigns at Large - Federico Maggi.pdf
2018-11-28 15:17
10M
Apache/2.4.54 (Ubuntu) Server at conference.hitb.org Port 443