Index of /files/hitbsecconf2021ams/materials

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]D1 COMMSEC - Exploitation with Shell Reverse and Infection with PowerShell - Filipi Pires.pdf2021-05-29 01:49 7.0M 
[   ]D1 COMMSEC - Model Robustness Will Hurt Data Privacy - Jiqiang Gao & Mengyun Tang.pdf2021-05-29 01:49 3.3M 
[   ]D1 COMMSEC - One Stop Anomaly Shop - Andrei Cotaie & Tiberiu Boros.pdf2021-05-29 01:49 8.5M 
[   ]D1 COMMSEC - Shaping The Future of the 0Day Market - Andrea Zapparoli Manzoni.pdf2021-05-29 01:49 3.0M 
[   ]D1 COMMSEC - The History of Adversarial AI - Alex Polyakov & Eugene Neelou.pdf2021-05-29 01:49 7.9M 
[   ]D1T1 - Bypassing DEP with Jump-Oriented Programming - Bramwell Brizendine & Austin Babcock.pdf2021-06-01 08:15 4.7M 
[   ]D1T1 - Client-Side Attacks on Live-Streaming Services Using Grid Computing - S. Yoon, S. Myeong, S. Hwang, T. Yun & T. Kim.pdf2021-06-01 08:15 4.1M 
[   ]D1T1 - MacOS Local Security - Escaping the Sandbox and Bypassing TCC - Thijs Alkemade & Daan Keuper.pdf2021-06-01 08:15 33M 
[   ]D1T1 - POSWorld - Should You be Afraid of Hands-On Payment Devices? - Timur Yunusov & Aleksei Stennikov.pdf2021-06-01 08:15 4.2M 
[   ]D1T1 - Utilizing Lol-Drivers in Post Exploitation Tradecraft - Baris Akkaya.pdf2021-06-01 08:15 7.7M 
[   ]D1T2 - A Journey into Synology NAS - QC.pdf2021-06-01 08:15 5.9M 
[   ]D1T2 - Exploiting QSEE the Raelize Way - Cristofaro Mune & NIek TImmers.pdf2021-05-29 02:00 3.6M 
[   ]D1T2 - Rebuilding Heavens Gate - ShengHao Ma.pdf2021-06-01 08:15 200M 
[   ]D1T2 - When Qiling Framework Meets Symbolic Execution - Kaijern Lau, Kong ZiQiao & Wu ChenXu.pdf2021-06-01 08:15 1.7M 
[   ]D1T2 - X-in-the-Middle - Attacking Fast Charging Piles and Electric Vehicles - Wu HuiYu & Li Yuxiang.pdf2021-06-01 08:15 4.5M 
[   ]D2 COMMSEC - 5G Networks and Interconnect Threats - Martin Kacer.pdf2021-05-29 01:49 4.2M 
[   ]D2 COMMSEC - Breaking Siemens SIMATIC S7 PLC Protection Mechanism - Gao Jian.pdf2021-05-29 01:49 8.4M 
[   ]D2 COMMSEC - JARM Randomizer Evading JARM Fingerprinting - Dagmawi Mulugeta.pdf2021-05-29 01:49 1.8M 
[   ]D2 COMMSEC - Playing hide-n-seek with AWS GuardDuty - Sze Siong Teo.pdf2021-05-29 01:49 1.7M 
[   ]D2T1 - A New Attack Model for Hybrid Mobile Applications - Ce Qin.pdf2021-06-01 08:15 8.5M 
[   ]D2T1 - How I Found 16 Microsoft Office Excel Vulnerabilities in 6 Months - Quan Jin.pdf2021-06-01 08:15 835K 
[   ]D2T1 - The Phishermen - Dissecting Phishing Techniques of CloudDragon APT - Linda Kuo &Zih-Cing Liao .pdf2021-06-01 08:15 12M 
[   ]D2T1 - The Rise of Potatoes - Privilege Escalation in Windows Services - Andrea Pierini & Antonio Cocomazzi.pdf2021-06-01 08:15 2.3M 
[   ]D2T2 - A Black Box Escape Of Qemu Based On The USB Device - L. Kong, Y. Zhang & H. Qu.pdf2021-06-01 08:15 782K 
[   ]D2T2 - Attacking Cloud Native Kubernetes with CDK - Zebin Zhou & Yue Xu.pdf2021-06-01 08:15 9.0M 
[   ]D2T2 - Binary Fuzzing with Snapshot-Assisted-Driven Comparison Branch Analysis - Kijong Son.pdf2021-06-01 08:15 2.5M 
[   ]D2T2 - Discovering 10+ Vulnerabilities in Virtualbox - Chen Nan.pdf2021-06-01 08:15 1.9M 
[   ]D2T2 - Insecure Link:Security Analysis and Practical Attacks of LPWAN - Li YuXiang & Wu HuiYu.pdf2021-06-01 08:15 41M 
[   ]KEYNOTE 2 - The State of Mobile Security - Zuk Avraham.pdf2021-05-30 02:36 11M 

Apache/2.4.54 (Ubuntu) Server at conference.hitb.org Port 443