Index of /files/hitbsecconf2019ams/materials
Name
Last modified
Size
Description
Parent Directory
-
D1 KEYNOTE - Sometimes They Come Hack - Dhillon L33tdawg Kannabhiran.pdf
2019-05-09 03:48
4.8M
D1T1 - CSP - A Successful Mess Between Hardening and Mitigation - Lukas Weichselbaum & Michele Spagnuolo.pdf
2019-05-09 11:52
2.7M
D1T1 - MBUF-OFLOW - Finding Vulnerabilities in iOS MacOS Networking Code - Kevin Backhouse.pdf
2019-05-09 06:20
2.8M
D1T1 - Make ARM Shellcode Great Again - Saumil Shah.pdf
2019-05-09 05:19
51M
D1T1 - Modern Techniques to Deobfuscate UEFI:BIOS Malware - Alexandre Borges.pdf
2019-06-09 21:47
2.9M
D1T1 - Pwning Centrally-Controlled Smart Homes - Sanghyun Park & Seongjoon Cho.pdf
2019-05-09 13:28
40M
D1T1 - SeasCoASA - Exploiting a Small Leak in a Great Ship - Kaiyi Xu & Lily Tang.pdf
2019-05-09 12:40
3.6M
D1T1 - The Birdman and Cospas-Sarsat Satellites - Hao Jingli.pdf
2019-05-09 10:17
7.2M
D1T1 - Toctou Attacks Against Secure Boot - Trammell Hudson & Peter Bosch.pdf
2019-05-09 05:39
13M
D1T2 - Automated Discovery of Logical Privilege Escalation Bugs in Windows 10 - Wenxu Wu & Shi Qin.pdf
2019-05-09 13:30
17M
D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdf
2019-05-09 05:38
3.0M
D1T2 - Duplicatinng Black Box Machine Learning Models - Rewanth Cool & Nikhil Joshi.pdf
2019-05-09 10:13
5.4M
D1T2 - Fresh Apples - Researching New Attack Interfaces on iOS and OSX - Moony Li & Lilang Wu.pdf
2019-05-09 10:14
4.8M
D1T2 - Hourglass Fuzz - A Quick Bug Hunting Method - Moony Li, Todd Han, Lance Jiang & Lilang Wu.pdf
2019-05-09 06:31
7.8M
D1T2 - Pwning HDMI for Fun and Profit - Jeonghoon Shin & Changhyeon Moon.pdf
2019-05-09 12:32
4.7M
D1T2 - fn_fuzzy - Fast Multiple Binary Diffing Triage - Takahiro Haruyama.pdf
2019-05-09 06:21
7.1M
D1T3 - Attacking GSM – Alarms, Smart Homes, Smart Watches and More - Alex Kolchanov.pdf
2019-06-09 21:26
728K
D1T3 - How to Dump, Parse, and Analyze i.MX Flash Memory Chips - Damien Cauquil.pdf
2019-05-14 23:59
3.1M
D1T3 - Reversing with Radare2 - Arnau Gamez Montolio.pdf
2019-05-09 11:57
1.5M
D1T3 - Wireless Hacking with Hack Cube - Jie Fu.pdf
2019-05-10 07:25
13M
D2 KEYNOTE - Securing Journalists - Runa Sandvik.pdf
2019-05-10 03:54
91K
D2T1 - Attacking Industrial Remote Controllers - Marco Balduzzi & Federico Maggi.pdf
2019-05-13 04:25
6.0M
D2T1 - Compiler Bugs and Bug Compilers - Marion Marschalek.pdf
2019-05-10 08:10
4.2M
D2T1 - Hacking Jenkins - Orange Tsai.pdf
2019-07-02 19:50
3.8M
D2T1 - Muraena - The Unexpected Phish - Michele Orru & Giuseppe Trotta.pdf
2019-05-10 07:45
11M
D2T1 - Sneaking Past Device Guard - Philip Tsukerman.pdf
2019-05-13 04:49
4.1M
D2T2 - Binder - The Bridge to Root - Hongli Han & Mingjian Zhou.pdf
2019-05-10 09:09
54M
D2T2 - Improving Unicode Encoding Attacks with Deep Learning - Alfonso Munoz & Miguel Hernandez Boza.pdf
2019-05-10 06:08
5.7M
D2T2 - ModJack - Hijacking the MacOS Kernel - Zhi Zhou.pdf
2019-05-10 14:53
13M
D2T2 - PanicXNU 3.0 - Juwei Lin & Junzhi Lu.pdf
2019-05-13 04:22
20M
D2T2 - Reversing Cryptographic Primitives Using Quantum Computing - Renaud Lifchitz.pdf
2019-05-10 07:27
1.9M
HAXPO D1 - A Decade of Infosec Tools - Thomas Debize.pdf
2019-05-09 12:30
1.3M
HAXPO D1 - Building an International Coordinated Bug Disclosure Bridge for the European Union - Benjamin Kunz.pdf
2019-05-09 12:38
2.6M
HAXPO D1 - Ghost Tunnel 2.0 - Blue Ghost - Yongtao Wang.pdf
2019-05-09 12:36
4.2M
HAXPO D1 - Hacking LTE Public Warning Systems - Weiguang Li.pdf
2019-05-09 12:47
22M
HAXPO D1 - Hacking the 0day Market - Andrea Zapparoli Manzoni.pdf
2019-05-09 06:34
3.9M
HAXPO D1 - Hiding a Secret Distributed Chat System Inside 802.11 Management Frames.pdf
2019-05-09 12:29
5.5M
HAXPO D1 - Infrared - Old Threats Meets New Devices - Wang Kang.pdf
2019-05-09 13:26
19M
HAXPO D1 - Social Networks - Can We Fix Them - Joel Hernandez.pdf
2019-05-09 11:59
37M
HAXPO D1 - VoLTE Phreaking - Ralph Moonen.pdf
2019-05-09 12:47
5.4M
HAXPO D1 - WiCy - Monitoring 802.11AC Networks at Scale.pdf
2019-05-09 06:42
3.6M
HAXPO D2 - Attacking Encrypted VoIP Protocols - Ivica Stipovic.pdf
2019-05-18 19:08
8.7M
HAXPO D2 - Demystifying IoT:OT Hacks With SDR - Himanshu Mehta & Harshit Agrawal.pdf
2019-05-10 09:16
921K
HAXPO D2 - Implementation and Evaluation of Secure and Scalable Anomaly-Based Network Intrusion Detection - Philipp Mieden.pdf
2019-05-13 04:32
17M
HAXPO D2 - The Red Flavour of SOC Automation and Orchestration - Nicolas Mattiocco.pdf
2019-05-10 07:24
26M