Index of /Meeting_Papers/HITB/2018/


../
A First Look Into The Security of The Apple Pen..> 05-Mar-2021 00:48    255K
CLOSING KEYNOTE - Rethinking The Cyber Kill Cha..> 05-Mar-2021 00:48    255K
CLOSING NOTE - Philippe Viola.pdf                  05-Mar-2021 00:48    255K
D1 - A First Look Into The Security of The Appl..> 05-Mar-2021 00:47      3M
D1 - A Year of Purple - Ryan Shepherd.pdf          05-Mar-2021 00:47      7M
D1 - Exploiting Automation in LTE Mobile Networ..> 05-Mar-2021 00:48      2M
D1 - FILE Structures - Another Binary Exploitat..> 05-Mar-2021 00:48      9M
D1 - Hardware Backdoors in x86 CPUs - Christoph..> 05-Mar-2021 00:48     12M
D1 - Owning Electronic Locks Without Leaving a ..> 05-Mar-2021 00:47     13M
D1 - Turning Memory Errors into Code Execution ..> 05-Mar-2021 00:48      1M
D1 COMMSEC - Breach Notification in Malaysia - ..> 05-Mar-2021 00:47      5M
D1 COMMSEC - Breaking Full Disk Encryption - Vi..> 05-Mar-2021 00:48      6M
D1 COMMSEC - Demystifying the Definitions of th..> 05-Mar-2021 00:48      3M
D1 COMMSEC - Generic and Static Detection of Mo..> 05-Mar-2021 00:47     10M
D1 COMMSEC - In the Trails of WINDSHIFT APT - T..> 05-Mar-2021 00:48      2M
D1 COMMSEC - KLara - Your New Friend - Dan Deme..> 05-Mar-2021 00:47      8M
D1 COMMSEC - Opening Remarks - Andrea Zapparoli..> 05-Mar-2021 00:48      1M
D1 COMMSEC - Securing ICS : SCADA - Defense in ..> 05-Mar-2021 00:47      3M
D1 COMMSEC - Surprise Rant 2.0 - Joern Schneewe..> 05-Mar-2021 00:48       0
D1 COMMSEC - WiFi, Phishing and Red Teaming - M..> 05-Mar-2021 00:48      1M
D1 KEYNOTE - (In)Security is Eating the World -..> 05-Mar-2021 00:48      9M
D2 - Decoding an iOS Vulnerability - Adam Donen..> 05-Mar-2021 00:48      3M
D2 - Hacking BLE Bicycle Locks for Fun and (a S..> 05-Mar-2021 00:47      5M
D2 - NFC Payments - The Art of Relay & Replay A..> 05-Mar-2021 00:48      3M
D2 - The Road to iOS Sandbox Escape - Rani Idan..> 05-Mar-2021 00:48      8M
D2 - Traversing the Kill-Chain - The New Shiny ..> 05-Mar-2021 00:48      3M
D2 COMMSEC - Blockchain and Smart Contract Atta..> 05-Mar-2021 00:47      2M
D2 COMMSEC - Cognitive Automation With Machine ..> 05-Mar-2021 00:48      5M
D2 COMMSEC - Data-Centric Cyber Threat Impact A..> 05-Mar-2021 00:48     12M
D2 COMMSEC - Hacking Mobile Games - Closing the..> 05-Mar-2021 00:48      3M
D2 COMMSEC - Internet of Things - Battle of the..> 05-Mar-2021 00:47      3M
D2 COMMSEC - Learning How to Smurf with Honeypo..> 05-Mar-2021 00:47      2M
D2 COMMSEC - Monitoring Native Execution in WoW..> 05-Mar-2021 00:47      2M
D2 COMMSEC - Software Security Era - Past, Pres..> 05-Mar-2021 00:48      3M
D2 COMMSEC - Using Machine Learning to Identify..> 05-Mar-2021 00:48      1M
D2 KEYNOTE - Machine Learning in Cybersecurity ..> 05-Mar-2021 00:48     17M
Exploiting Automation in LTE Mobile Networks - ..> 05-Mar-2021 00:48    562K
FILE Structures - Another Binary Exploitation T..> 05-Mar-2021 00:48      4M
Hardware Backdoors in x86 CPUs - Christopher Do..> 05-Mar-2021 00:47    634K
NFC Payments - The Art of Relay and Replay Atta..> 05-Mar-2021 00:48    663K
The Road to iOS Sandbox Escape - Rani Idan.pdf     05-Mar-2021 00:48    574K