Index of /files/hitbsecconf2019ams/materials

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]D1 KEYNOTE - Sometimes They Come Hack - Dhillon L33tdawg Kannabhiran.pdf2019-05-09 03:48 4.8M 
[   ]D1T1 - CSP - A Successful Mess Between Hardening and Mitigation - Lukas Weichselbaum & Michele Spagnuolo.pdf2019-05-09 11:52 2.7M 
[   ]D1T1 - MBUF-OFLOW - Finding Vulnerabilities in iOS MacOS Networking Code - Kevin Backhouse.pdf2019-05-09 06:20 2.8M 
[   ]D1T1 - Make ARM Shellcode Great Again - Saumil Shah.pdf2019-05-09 05:19 51M 
[   ]D1T1 - Modern Techniques to Deobfuscate UEFI:BIOS Malware - Alexandre Borges.pdf2019-06-09 21:47 2.9M 
[   ]D1T1 - Pwning Centrally-Controlled Smart Homes - Sanghyun Park & Seongjoon Cho.pdf2019-05-09 13:28 40M 
[   ]D1T1 - SeasCoASA - Exploiting a Small Leak in a Great Ship - Kaiyi Xu & Lily Tang.pdf2019-05-09 12:40 3.6M 
[   ]D1T1 - The Birdman and Cospas-Sarsat Satellites - Hao Jingli.pdf2019-05-09 10:17 7.2M 
[   ]D1T1 - Toctou Attacks Against Secure Boot - Trammell Hudson & Peter Bosch.pdf2019-05-09 05:39 13M 
[   ]D1T2 - Automated Discovery of Logical Privilege Escalation Bugs in Windows 10 - Wenxu Wu & Shi Qin.pdf2019-05-09 13:30 17M 
[   ]D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdf2019-05-09 05:38 3.0M 
[   ]D1T2 - Duplicatinng Black Box Machine Learning Models - Rewanth Cool & Nikhil Joshi.pdf2019-05-09 10:13 5.4M 
[   ]D1T2 - Fresh Apples - Researching New Attack Interfaces on iOS and OSX - Moony Li & Lilang Wu.pdf2019-05-09 10:14 4.8M 
[   ]D1T2 - Hourglass Fuzz - A Quick Bug Hunting Method - Moony Li, Todd Han, Lance Jiang & Lilang Wu.pdf2019-05-09 06:31 7.8M 
[   ]D1T2 - Pwning HDMI for Fun and Profit - Jeonghoon Shin & Changhyeon Moon.pdf2019-05-09 12:32 4.7M 
[   ]D1T2 - fn_fuzzy - Fast Multiple Binary Diffing Triage - Takahiro Haruyama.pdf2019-05-09 06:21 7.1M 
[   ]D1T3 - Attacking GSM – Alarms, Smart Homes, Smart Watches and More - Alex Kolchanov.pdf2019-06-09 21:26 728K 
[   ]D1T3 - How to Dump, Parse, and Analyze i.MX Flash Memory Chips - Damien Cauquil.pdf2019-05-14 23:59 3.1M 
[   ]D1T3 - Reversing with Radare2 - Arnau Gamez Montolio.pdf2019-05-09 11:57 1.5M 
[   ]D1T3 - Wireless Hacking with Hack Cube - Jie Fu.pdf2019-05-10 07:25 13M 
[   ]D2 KEYNOTE - Securing Journalists - Runa Sandvik.pdf2019-05-10 03:54 91K 
[   ]D2T1 - Attacking Industrial Remote Controllers - Marco Balduzzi & Federico Maggi.pdf2019-05-13 04:25 6.0M 
[   ]D2T1 - Compiler Bugs and Bug Compilers - Marion Marschalek.pdf2019-05-10 08:10 4.2M 
[   ]D2T1 - Muraena - The Unexpected Phish - Michele Orru & Giuseppe Trotta.pdf2019-05-10 07:45 11M 
[   ]D2T1 - Sneaking Past Device Guard - Philip Tsukerman.pdf2019-05-13 04:49 4.1M 
[   ]D2T2 - Binder - The Bridge to Root - Hongli Han & Mingjian Zhou.pdf2019-05-10 09:09 54M 
[   ]D2T2 - Improving Unicode Encoding Attacks with Deep Learning - Alfonso Munoz & Miguel Hernandez Boza.pdf2019-05-10 06:08 5.7M 
[   ]D2T2 - ModJack - Hijacking the MacOS Kernel - Zhi Zhou.pdf2019-05-10 14:53 13M 
[   ]D2T2 - PanicXNU 3.0 - Juwei Lin & Junzhi Lu.pdf2019-05-13 04:22 20M 
[   ]D2T2 - Reversing Cryptographic Primitives Using Quantum Computing - Renaud Lifchitz.pdf2019-05-10 07:27 1.9M 
[   ]HAXPO D1 - A Decade of Infosec Tools - Thomas Debize.pdf2019-05-09 12:30 1.3M 
[   ]HAXPO D1 - Building an International Coordinated Bug Disclosure Bridge for the European Union - Benjamin Kunz.pdf2019-05-09 12:38 2.6M 
[   ]HAXPO D1 - Ghost Tunnel 2.0 - Blue Ghost - Yongtao Wang.pdf2019-05-09 12:36 4.2M 
[   ]HAXPO D1 - Hacking LTE Public Warning Systems - Weiguang Li.pdf2019-05-09 12:47 22M 
[   ]HAXPO D1 - Hacking the 0day Market - Andrea Zapparoli Manzoni.pdf2019-05-09 06:34 3.9M 
[   ]HAXPO D1 - Hiding a Secret Distributed Chat System Inside 802.11 Management Frames.pdf2019-05-09 12:29 5.5M 
[   ]HAXPO D1 - Infrared - Old Threats Meets New Devices - Wang Kang.pdf2019-05-09 13:26 19M 
[   ]HAXPO D1 - Social Networks - Can We Fix Them - Joel Hernandez.pdf2019-05-09 11:59 37M 
[   ]HAXPO D1 - VoLTE Phreaking - Ralph Moonen.pdf2019-05-09 12:47 5.4M 
[   ]HAXPO D1 - WiCy - Monitoring 802.11AC Networks at Scale.pdf2019-05-09 06:42 3.6M 
[   ]HAXPO D2 - Attacking Encrypted VoIP Protocols - Ivica Stipovic.pdf2019-05-18 19:08 8.7M 
[   ]HAXPO D2 - Demystifying IoT:OT Hacks With SDR - Himanshu Mehta & Harshit Agrawal.pdf2019-05-10 09:16 921K 
[   ]HAXPO D2 - Implementation and Evaluation of Secure and Scalable Anomaly-Based Network Intrusion Detection - Philipp Mieden.pdf2019-05-13 04:32 17M 
[   ]HAXPO D2 - The Red Flavour of SOC Automation and Orchestration - Nicolas Mattiocco.pdf2019-05-10 07:24 26M