Index of /Meeting_Papers/HITB/2017/


../
CLOSING-KEYNOTE---Natalie-Silvanovich---The-ECM..> 16-May-2020 12:43    459K
D1T1---A-New-RISC---Don-Bailey.pdf                 16-May-2020 12:43     22M
D1T1---Ayoub-Elaassal---Hacking-Customer-Inform..> 16-May-2020 12:43      4M
D1T1---Michele-Spagnuolo-and-Lukas-Wilschelbaum..> 16-May-2020 12:43      2M
D1T1---Richard-Johnson---Harnessing-Intel-Proce..> 16-May-2020 12:43      4M
D1T1---Steven-Seeley-and-Roberto-Suggi-Liverani..> 16-May-2020 12:42    154M
D1T1---Victor-van-der-Veen---Drammer-The-Making..> 16-May-2020 12:43     26M
D1T2---JeongHoon-Shin---Femotcell-Hacking.pdf      16-May-2020 12:43      4M
D1T2---Jos-Wyers---A-Guide-to-Key-Impressioning..> 16-May-2020 12:42    120M
D1T2---Linan-Hao-and-Long-Liu---The-Secret-of-C..> 16-May-2020 12:43      2M
D1T2---Najwa-Aaraj---Side-Channel-Attacks-Again..> 16-May-2020 12:43      2M
D1T2---Seunghun-Han---Shadow-Box---The-Practica..> 16-May-2020 12:43      3M
D1T2---Slawomir-Jasek---Cloning-Any-Android-HCE..> 16-May-2020 12:43      3M
D1T3---Clarence-Chio-and-Anto-Joseph---Practica..> 16-May-2020 12:43      2M
D1T3---Didier-Stevens---Analyzing-Malicious-Off..> 16-May-2020 12:43    833K
D1T3---Steve-Lord---Unbridled-HIDIOcy.pdf          16-May-2020 12:43      2M
D1T4---Dominic-Spill---Low-Cost-Open-Source-Spe..> 16-May-2020 12:43     24M
D1T4---George-Chatzisofroniou---Exploiting-Wind..> 16-May-2020 12:43    996K
D1T4---Marc-Newlin-and-Matt-Knight---So-You-Wan..> 16-May-2020 12:43     10M
D1T4---Miika-Turkia---Pwning-Banks.pdf             16-May-2020 12:43    519K
D1T4---Niek-Timmers-and-Albert-Spruyt---Fault-I..> 16-May-2020 12:43      3M
D1T4---Niels-Warnars---Disarming-EMET.pdf          16-May-2020 12:43    267K
D1T4---Patrick-Wardle---Meet-and-Greet-with-the..> 16-May-2020 12:43     17M
D1T4---Paulus-Meesen-and-Don-Mulders---A-Passiv..> 16-May-2020 12:43    710K
D1T4---Vladamir-Katalov---Breaking-Apples-iClou..> 16-May-2020 12:43      6M
D2T1---Ben-Hayak---Advanced-Same-Origin-Method-..> 16-May-2020 12:43     19M
D2T1---Bing-Sun-and-Chong-Xu---Bypassing-Memory..> 16-May-2020 12:43      3M
D2T1---Markus-Vervier---Hunting-for-Vulnerabili..> 16-May-2020 12:43      5M
D2T1---Patrick-Wardle---Oversight---Exposing-Sp..> 16-May-2020 12:43     27M
D2T1---S_-Huber.-S_-Artz-and-S_-Rasthofer---Vul..> 16-May-2020 12:43      2M
D2T1---Trammel-Hudson---Bootstrapping-Systems-w..> 16-May-2020 12:42     16M
D2T2---Anirudh-Duggal---Hacking-Medical-Devices..> 16-May-2020 12:42      4M
D2T2---Antonios-Atlasis---An-Attack-in-Depth-An..> 16-May-2020 12:42      5M
D2T2---Yingtao-Zeng.-Qing-Yang-and-Jun-Li---Car..> 16-May-2020 12:42      8M
D2T2---Yu-Hong---Attack-Surface-Extended-by-URL..> 16-May-2020 12:42     12M
D2T3---James-Forshaw---Introduction-to-Logical-..> 16-May-2020 12:42      3M
D2T3---Slawomir-Jasek---Blue-Picking---Hacking-..> 16-May-2020 12:42      7M
D2T4---Aseem-Jakhar---IoT-Hacking-Simplified.pdf   16-May-2020 12:42     33M
D2T4---Chris-van-den-Hooven---Will-It-Blend--CI..> 16-May-2020 12:42    610K
D2T4---Don-Bailey---Unauthorized-Erlang.pdf        16-May-2020 12:42    822K
D2T4---Emmanuel-Gadaix---A-Surprise-Encounter-W..> 16-May-2020 12:42     75M
D2T4---Koh-Yong-Chuan---Understanding-the-Micro..> 16-May-2020 12:42      2M
D2T4---Maxim-Goryachy-and-Mark-Ermalov---Intel-..> 16-May-2020 12:42     20M
D2T4---Muhamad-Abdul-Wahab-and-Pascal-Cortret--..> 16-May-2020 12:42      2M
D2T4---Rob-Fletcher---Bug-Bounty-from-a-Program..> 16-May-2020 12:42    637K
D2T4---Steven-Wierckx---How-to-Make-a-Magic-Mir..> 16-May-2020 12:42      3M
KEYNOTE-1---Saumil-Shah---Redefining-Defense.pdf   16-May-2020 12:42     19M