Index of /Meeting_Papers/BlackHat/USA-2020/


../
us-20-Akgul-Improving-Mental-Models-Of-End-To-E..> 02-Aug-2021 16:20      6M
us-20-Alexander-Needing-The-DoH-The-Ongoing-Enc..> 02-Aug-2021 16:20    613K
us-20-Amar-Breaking-VSM-By-Attacking-SecureKern..> 02-Aug-2021 16:20      6M
us-20-Artuso-An-Unauthenticated-Journey-To-Root..> 02-Aug-2021 16:20    294K
us-20-Artuso-An-Unauthenticated-Journey-To-Root..> 02-Aug-2021 16:20      6M
us-20-Avrahami-Escaping-Virtualized-Containers.pdf 02-Aug-2021 16:20      3M
us-20-Azad-iOS-Kernel-PAC-One-Year-Later.pdf       02-Aug-2021 16:20      5M
us-20-Baker-Policy-Implications-Of-Faulty-Risk-..> 02-Aug-2021 16:20      3M
us-20-Balduzzi-Industrial-Protocol-Gateways-Und..> 02-Aug-2021 16:20      2M
us-20-Balduzzi-Industrial-Protocol-Gateways-Und..> 02-Aug-2021 16:20      5M
us-20-Bardin-About-Directed-Fuzzing-And-Use-Aft..> 02-Aug-2021 16:20      3M
us-20-Basu-How-I-Created-My-Clone-Using-AI-Next..> 02-Aug-2021 16:20     36M
us-20-Beach-Westmoreland-Hacking-The-Voter-Less..> 02-Aug-2021 16:20      3M
us-20-Berta-Defending-Containers-Like-A-Ninja-A..> 02-Aug-2021 16:20      6M
us-20-Bienstock-My-Cloud-Is-APTs-Cloud-Investig..> 02-Aug-2021 16:20      1M
us-20-Bitton-A-Framework-For-And-Patching-The-H..> 02-Aug-2021 16:20      3M
us-20-Block-Hiding-Process-Memory-Via-Anti-Fore..> 02-Aug-2021 16:20      4M
us-20-Buhren-All-You-Ever-Wanted-To-Know-About-..> 02-Aug-2021 16:20      2M
us-20-Burgess-Detecting-Access-Token-Manipulati..> 02-Aug-2021 16:20      2M
us-20-Chao-Breaking-Samsungs-Root-Of-Trust-Expl..> 02-Aug-2021 16:20      3M
us-20-Chen-Operation-Chimera-APT-Operation-Targ..> 02-Aug-2021 16:20      2M
us-20-Chen-Operation-Chimera-APT-Operation-Targ..> 02-Aug-2021 16:20      4M
us-20-Chen-You-Have-No-Idea-Who-Sent-That-Email..> 02-Aug-2021 16:20    957K
us-20-Chen-You-Have-No-Idea-Who-Sent-That-Email..> 02-Aug-2021 16:20     15M
us-20-Classen-Spectra-Breaking-Separation-Betwe..> 02-Aug-2021 16:20      6M
us-20-Cureton-Heroku-Abuse-Operations-Hunting-W..> 02-Aug-2021 16:20      4M
us-20-Demirkapi-Demystifying-Modern-Windows-Roo..> 02-Aug-2021 16:20    531K
us-20-Edwards-The-Devils-In-The-Dependency-Data..> 02-Aug-2021 16:20      2M
us-20-Fogie-HealthScare-An-Insiders-Biospy-Of-H..> 02-Aug-2021 16:20     11M
us-20-Gong-TiYunZong-An-Exploit-Chain-To-Remote..> 02-Aug-2021 16:20      1M
us-20-Gong-TiYunZong-An-Exploit-Chain-To-Remote..> 02-Aug-2021 16:20      1M
us-20-Gregory-Uncommon-Sense-Detecting-Exploits..> 02-Aug-2021 16:20      2M
us-20-Grubbs-Hunting-Invisible-Salamanders-Cryp..> 02-Aug-2021 16:20      3M
us-20-Guo-Ruling-StarCraft-Game-Spitefully-Expl..> 02-Aug-2021 16:20      2M
us-20-Hadar-A-Decade-After-Stuxnet-Printer-Vuln..> 02-Aug-2021 16:20    854K
us-20-Hadar-A-Decade-After-Stuxnet-Printer-Vuln..> 02-Aug-2021 16:20      6M
us-20-Heriveaux-Black-Box-Laser-Fault-Injection..> 02-Aug-2021 16:20      6M
us-20-Hernandez-Emulating-Samsungs-Baseband-For..> 02-Aug-2021 16:20      7M
us-20-Jin-CloudLeak-DNN-Model-Extractions-From-..> 02-Aug-2021 16:20    498K
us-20-Jin-CloudLeak-DNN-Model-Extractions-From-..> 02-Aug-2021 16:20      2M
us-20-Joly-I-Calcd-Calc-Exploiting-Excel-Online..> 02-Aug-2021 16:20      1M
us-20-Kettle-Web-Cache-Entanglement-Novel-Pathw..> 02-Aug-2021 16:20    390K
us-20-Kettle-Web-Cache-Entanglement-Novel-Pathw..> 02-Aug-2021 16:20      1M
us-20-Kiley-Reverse-Engineering-The-Tesla-Batte..> 02-Aug-2021 16:20      2M
us-20-Kiley-Reverse-Engineering-The-Tesla-Batte..> 02-Aug-2021 16:20      2M
us-20-Klein-HTTP-Request-Smuggling-In-2020-New-..> 02-Aug-2021 16:20    308K
us-20-Klein-HTTP-Request-Smuggling-In-2020-New-..> 02-Aug-2021 16:20    421K
us-20-Koech-Building-Cyber-Security-Strategies-..> 02-Aug-2021 16:20      7M
us-20-Kovah-Finding-New-Bluetooth-Low-Energy-Ex..> 02-Aug-2021 16:20      6M
us-20-Lee-Exploiting-Kernel-Races-Through-Tamin..> 02-Aug-2021 16:20      1M
us-20-Lipovsky-Kr00k-Serious-Vulnerability-Affe..> 02-Aug-2021 16:20    345K
us-20-Lipovsky-Kr00k-Serious-Vulnerability-Affe..> 02-Aug-2021 16:20     16M
us-20-Livelli-Decade-Of-The-RATs-Custom-Chinese..> 02-Aug-2021 16:20    924K
us-20-Mackinnon-Engineering-Empathy-Adapting-So..> 02-Aug-2021 16:20      1M
us-20-Maddux-When-TLS-Hacks-You.pdf                02-Aug-2021 16:20      1M
us-20-Maggi-OTRazor-Static-Code-Analysis-For-Vu..> 02-Aug-2021 16:20      5M
us-20-Maggi-OTRazor-Static-Code-Analysis-For-Vu..> 02-Aug-2021 16:20     20M
us-20-Michaels-Carrying-Our-Insecurities-With-U..> 02-Aug-2021 16:20    540K
us-20-Michaels-Carrying-Our-Insecurities-With-U..> 02-Aug-2021 16:20      3M
us-20-Moghimi-Remote-Timing-Attacks-On-TPMs-AKA..> 02-Aug-2021 16:20      3M
us-20-Moghimi-Remote-Timing-Attacks-On-TPMs-AKA..> 02-Aug-2021 16:20      4M
us-20-Mueller-Portable-Document-Flaws-101-wp.pdf   02-Aug-2021 16:20    571K
us-20-Mueller-Portable-Document-Flaws-101.pdf      02-Aug-2021 16:20      2M
us-20-Munoz-Room-For-Escape-Scribbling-Outside-..> 02-Aug-2021 16:21      1M
us-20-Munoz-Room-For-Escape-Scribbling-Outside-..> 02-Aug-2021 16:21      2M
us-20-Murdock-Plundervolt-Flipping-Bits-From-So..> 02-Aug-2021 16:21     26M
us-20-Nassi-Lamphone-Real-Time-Passive-Reconstr..> 02-Aug-2021 16:21      5M
us-20-Oberman-Hacking-The-Supply-Chain-The-Ripp..> 02-Aug-2021 16:21      1M
us-20-Park-NoJITsu-Locking-Down-JavaScript-Engi..> 02-Aug-2021 16:21    352K
us-20-Park-NoJITsu-Locking-Down-JavaScript-Engi..> 02-Aug-2021 16:21      3M
us-20-Parker-Stopping-Snake-Oil-With-Smaller-He..> 02-Aug-2021 16:21    360K
us-20-Parker-Stopping-Snake-Oil-With-Smaller-He..> 02-Aug-2021 16:21      1M
us-20-Parker-The-Dark-Side-Of-The-Cloud-How-A-L..> 02-Aug-2021 16:21      2M
us-20-Pavur-Whispers-Among-The-Stars-Perpetrati..> 02-Aug-2021 16:21      6M
us-20-Perlow-FASTCash-And-INJX_Pure-How-Threat-..> 02-Aug-2021 16:21      2M
us-20-Perlow-FASTCash-And-INJX_Pure-How-Threat-..> 02-Aug-2021 16:21      3M
us-20-Quintin-Detecting-Fake-4G-Base-Stations-I..> 02-Aug-2021 16:21      4M
us-20-Riley-A-Little-Less-Speculation-A-Little-..> 02-Aug-2021 16:21      1M
us-20-Ruytenberg-When-Lightning-Strikes-Thrice-..> 02-Aug-2021 16:19      2M
us-20-Ruytenberg-When-Lightning-Strikes-Thrice-..> 02-Aug-2021 16:19      6M
us-20-Sedova-Mind-Games-Using-Data-To-Solve-For..> 02-Aug-2021 16:20     45M
us-20-Sehgal-Making-An-Impact-From-India-To-The..> 02-Aug-2021 16:20      4M
us-20-Seri-EtherOops-Exploring-Practical-Method..> 02-Aug-2021 16:20      5M
us-20-Seri-EtherOops-Exploring-Practical-Method..> 02-Aug-2021 16:20      5M
us-20-Shekari-IoT-Skimmer-Energy-Market-Manipul..> 02-Aug-2021 16:20      6M
us-20-Stone-Reversing-The-Root-Identifying-The-..> 02-Aug-2021 16:20    724K
us-20-Tully-Repurposing-Neural-Networks-To-Gene..> 02-Aug-2021 16:20      4M
us-20-Venault-Fooling-Windows-Through-Superfetc..> 02-Aug-2021 16:20      4M
us-20-Wade-Beyond-Root-Custom-Firmware-For-Embe..> 02-Aug-2021 16:20      3M
us-20-Wang-Dive-into-Apple-IO80211FamilyV2.pdf     02-Aug-2021 16:20      2M
us-20-Wardle-Office-Drama-On-macOS.pdf             02-Aug-2021 16:20      5M
us-20-Wixey-Breaking-Brains-Solving-Problems-Le..> 02-Aug-2021 16:20    975K
us-20-Wlaschin-Building-A-Vulnerability-Disclos..> 02-Aug-2021 16:20      6M
us-20-Wolfe-Edtech-The-Ultimate-Apt-wp.pdf         02-Aug-2021 16:20     42K
us-20-Wolfe-Edtech-The-Ultimate-Apt.pdf            02-Aug-2021 16:20      2M
us-20-Xiao-Discovering-Hidden-Properties-To-Att..> 02-Aug-2021 16:20      2M
us-20-Xu-Stealthily-Access-Your-Android-Phones-..> 02-Aug-2021 16:20      4M
us-20-Yan-Security-Research-On-Mercedes-Benz-Fr..> 02-Aug-2021 16:20      3M
us-20-Yan-Security-Research-On-Mercedes-Benz-Fr..> 02-Aug-2021 16:20      9M
us-20-Ying-Superman-Powered-By-Kryptonite-Turn-..> 02-Aug-2021 16:20      2M
us-20-Ying-Superman-Powered-By-Kryptonite-Turn-..> 02-Aug-2021 16:20      2M
us-20-Ziolkowski-Routopsy-Modern-Routing-Protoc..> 02-Aug-2021 16:20      4M
us-20-vanderWalt-Virtually-Private-Networks-wp.pdf 02-Aug-2021 16:20     16M
us-20-vanderWalt-Virtually-Private-Networks.pdf    02-Aug-2021 16:20      7M