Index of /files/hitbsecconf2023ams/materials

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]CLOSING KEYNOTE - The Hand That Strikes Also Blocks - Saumil Shah.pdf2023-05-09 23:45 17M 
[   ]D1 COMMSEC - API Security in the Age of Microservices - Ali Abdollahi.pdf2023-04-20 10:15 2.3M 
[   ]D1 COMMSEC - All You Always Wanted to Know About Antiviruses - Marcus Botacin.pdf2023-04-20 11:45 6.1M 
[   ]D1 COMMSEC - Exploring JARM - An Active TLS Fingerprinting Algorithm - Mohamad Mokbel.pdf2023-05-09 23:45 826K 
[   ]D1 COMMSEC - Nomadic Honeypots - How to Create Actionable CTI - Laurent Oudot.pdf2023-04-20 14:02 4.6M 
[   ]D1 COMMSEC - Upgrading Rollback Agnostic Replay Attacks - Carlos Gomez.pdf2023-04-21 09:23 8.4M 
[   ]D1T1 - Leveraging Advanced Techniques of DMA Reentrancy to Escape QEMU - Quan Jin & Ao Wang.pdf2023-04-21 12:38 1.5M 
[   ]D1T1 - Nakatomi Space - Lateral Movement as L1 Post-Exploitation in OT - Jos Wetzels.pdf2023-04-20 11:23 7.4M 
[   ]D1T1 - Poisoned Apples- Current State of iOS Malware Detection - Matthias Frielingsdorf.pdf2023-04-20 14:04 7.3M 
[   ]D1T1 - The Lost World of DirectComposition- Hunting Windows Desktop Window Manager Bugs - Zhang WangJunjie, YiSheng He & Wenyue Li.pdf2023-04-20 14:01 9.1M 
[   ]D1T1 - Your Not So Home Office - Soho Hacking at Pwn2Own - McCaulay Hudson & Alex Plaskett.pdf2023-04-20 13:01 5.8M 
[   ]D1T2 - 3 Years in China - A Tale of Building a REAL Full-Speed Anti-Censorship Router - Kaijern Lau.pdf2023-04-20 13:59 8.0M 
[   ]D1T2 - A Tale of Building a REAL Full Speed Anti-Censorship Router - KaiJern Lau.pdf2023-04-21 12:47 8.0M 
[   ]D1T2 - Bypassing Anti-Cheats & Hacking Competitive Games - Rohan Aggarwal.pdf2023-05-11 03:14 2.7M 
[   ]D1T2 - The Next Generation of Virtualization-Based Obfuscators - Tim Blazytko & Moritz Schloegel.pdf2023-04-20 13:21 2.3M 
[   ]D1T2 - The Next Generation of Virtualization-based Obfuscators - Tim Blazytko & Moritz Sholoegel.pdf2023-04-21 14:12 2.3M 
[   ]D1T2 - Windows Syscalls in Shellcode - Advanced Techniques for Malicious Functionality - Bramwell Brizendine.pdf2023-04-20 11:13 17M 
[   ]D1T2 - XRP Raid Protector - Killing a Critical Bug Worth 40 Billion Dollars - Haoyu Yang.pdf2023-04-20 10:21 1.5M 
[   ]D2 COMMSEC - Feeding Gophers to Ghidra - Max Kersten.pdf2023-04-21 12:57 422K 
[   ]D2 COMMSEC - Red Wizard - A User-friendly Infrastructure for Red Teams - Ben Brucker.pdf2023-04-21 12:32 2.7M 
[   ]D2 COMMSEC - The Return of Stack Overflows in the Linux Kernel - Davide Ornaghi.pdf2023-04-29 07:39 2.6M 
[   ]D2 COMMSEC LAB - Developing Malicious Kernel Drivers - Tijme Gommers & Jaan-Jaap Korpershoek.pdf2023-04-21 14:09 4.2M 
[   ]D2T1 - A Deep Dive into GarminOS and its MonkeyC Virtual Machine - Tao Sauvage.pdf2023-04-21 14:14 3.8M 
[   ]D2T1 - A Security Analysis of Computer Numerical Control Machines in Industry 4.0 - Marco Balduzzi.pdf2023-04-21 15:14 6.0M 
[   ]D2T1 - ChatGPT Please Write Me a Piece of Polymorphic Malware - Omer Tsarfati & Eran Shimony.pdf2023-04-21 14:08 4.5M 
[   ]D2T1 - How MySQL Servers Can Attack YOU - Martin Rahkmanov & Alexander Rubin.pdf2023-04-21 12:30 5.4M 
[   ]D2T1 - Smart Speaker Shenanigans - Making the SONOS One Sing Its Secrets - Peter Geissler.pdf2023-04-21 13:00 19M 
[   ]D2T2 - Active Directory Abuse Primitive and Operation Security - Mars Cheng.pdf2023-05-17 08:10 6.5M 
[   ]D2T2 - Automated Black-box Security Testing of Smart Embedded Devices - Andrea Continella.pdf2023-04-21 12:39 5.3M 
[   ]D2T2 - Privilege Escalation Using DOP in MacOS x86-64 - Yoochan Lee.pdf2023-04-21 14:06 2.3M 

Apache/2.4.54 (Ubuntu) Server at conference.hitb.org Port 443