Index of /Meeting_Papers/HITB/2017/


../
CLOSING-KEYNOTE---Natalie-Silvanovich---The-ECM..> 05-Mar-2021 00:49    459K
D1T1---A-New-RISC---Don-Bailey.pdf                 05-Mar-2021 00:49     22M
D1T1---Ayoub-Elaassal---Hacking-Customer-Inform..> 05-Mar-2021 00:49      4M
D1T1---Michele-Spagnuolo-and-Lukas-Wilschelbaum..> 05-Mar-2021 00:48      2M
D1T1---Richard-Johnson---Harnessing-Intel-Proce..> 05-Mar-2021 00:49      4M
D1T1---Steven-Seeley-and-Roberto-Suggi-Liverani..> 05-Mar-2021 00:49    154M
D1T1---Victor-van-der-Veen---Drammer-The-Making..> 05-Mar-2021 00:49     26M
D1T2---JeongHoon-Shin---Femotcell-Hacking.pdf      05-Mar-2021 00:48      4M
D1T2---Jos-Wyers---A-Guide-to-Key-Impressioning..> 05-Mar-2021 00:49    120M
D1T2---Linan-Hao-and-Long-Liu---The-Secret-of-C..> 05-Mar-2021 00:49      2M
D1T2---Najwa-Aaraj---Side-Channel-Attacks-Again..> 05-Mar-2021 00:49      2M
D1T2---Seunghun-Han---Shadow-Box---The-Practica..> 05-Mar-2021 00:48      3M
D1T2---Slawomir-Jasek---Cloning-Any-Android-HCE..> 05-Mar-2021 00:48      3M
D1T3---Clarence-Chio-and-Anto-Joseph---Practica..> 05-Mar-2021 00:49      2M
D1T3---Didier-Stevens---Analyzing-Malicious-Off..> 05-Mar-2021 00:49    833K
D1T3---Steve-Lord---Unbridled-HIDIOcy.pdf          05-Mar-2021 00:48      2M
D1T4---Dominic-Spill---Low-Cost-Open-Source-Spe..> 05-Mar-2021 00:48     24M
D1T4---George-Chatzisofroniou---Exploiting-Wind..> 05-Mar-2021 00:49    996K
D1T4---Marc-Newlin-and-Matt-Knight---So-You-Wan..> 05-Mar-2021 00:48     10M
D1T4---Miika-Turkia---Pwning-Banks.pdf             05-Mar-2021 00:49    519K
D1T4---Niek-Timmers-and-Albert-Spruyt---Fault-I..> 05-Mar-2021 00:49      3M
D1T4---Niels-Warnars---Disarming-EMET.pdf          05-Mar-2021 00:48    267K
D1T4---Patrick-Wardle---Meet-and-Greet-with-the..> 05-Mar-2021 00:49     17M
D1T4---Paulus-Meesen-and-Don-Mulders---A-Passiv..> 05-Mar-2021 00:49    710K
D1T4---Vladamir-Katalov---Breaking-Apples-iClou..> 05-Mar-2021 00:48      6M
D2T1---Ben-Hayak---Advanced-Same-Origin-Method-..> 05-Mar-2021 00:49     19M
D2T1---Bing-Sun-and-Chong-Xu---Bypassing-Memory..> 05-Mar-2021 00:49      3M
D2T1---Markus-Vervier---Hunting-for-Vulnerabili..> 05-Mar-2021 00:49      5M
D2T1---Patrick-Wardle---Oversight---Exposing-Sp..> 05-Mar-2021 00:49     27M
D2T1---S_-Huber.-S_-Artz-and-S_-Rasthofer---Vul..> 05-Mar-2021 00:49      2M
D2T1---Trammel-Hudson---Bootstrapping-Systems-w..> 05-Mar-2021 00:48     16M
D2T2---Anirudh-Duggal---Hacking-Medical-Devices..> 05-Mar-2021 00:48      4M
D2T2---Antonios-Atlasis---An-Attack-in-Depth-An..> 05-Mar-2021 00:49      5M
D2T2---Yingtao-Zeng.-Qing-Yang-and-Jun-Li---Car..> 05-Mar-2021 00:49      8M
D2T2---Yu-Hong---Attack-Surface-Extended-by-URL..> 05-Mar-2021 00:48     12M
D2T3---James-Forshaw---Introduction-to-Logical-..> 05-Mar-2021 00:48      3M
D2T3---Slawomir-Jasek---Blue-Picking---Hacking-..> 05-Mar-2021 00:48      7M
D2T4---Aseem-Jakhar---IoT-Hacking-Simplified.pdf   05-Mar-2021 00:48     33M
D2T4---Chris-van-den-Hooven---Will-It-Blend--CI..> 05-Mar-2021 00:48    610K
D2T4---Don-Bailey---Unauthorized-Erlang.pdf        05-Mar-2021 00:49    822K
D2T4---Emmanuel-Gadaix---A-Surprise-Encounter-W..> 05-Mar-2021 00:49     75M
D2T4---Koh-Yong-Chuan---Understanding-the-Micro..> 05-Mar-2021 00:48      2M
D2T4---Maxim-Goryachy-and-Mark-Ermalov---Intel-..> 05-Mar-2021 00:49     20M
D2T4---Muhamad-Abdul-Wahab-and-Pascal-Cortret--..> 05-Mar-2021 00:49      2M
D2T4---Rob-Fletcher---Bug-Bounty-from-a-Program..> 05-Mar-2021 00:49    637K
D2T4---Steven-Wierckx---How-to-Make-a-Magic-Mir..> 05-Mar-2021 00:49      3M
KEYNOTE-1---Saumil-Shah---Redefining-Defense.pdf   05-Mar-2021 00:48     19M