Index of /Meeting_Papers/HITB/2018/


../
A First Look Into The Security of The Apple Pen..> 16-May-2020 12:42    255K
CLOSING KEYNOTE - Rethinking The Cyber Kill Cha..> 16-May-2020 12:42    255K
CLOSING NOTE - Philippe Viola.pdf                  16-May-2020 12:42    255K
D1 - A First Look Into The Security of The Appl..> 16-May-2020 12:42      3M
D1 - A Year of Purple - Ryan Shepherd.pdf          16-May-2020 12:42      7M
D1 - Exploiting Automation in LTE Mobile Networ..> 16-May-2020 12:42      2M
D1 - FILE Structures - Another Binary Exploitat..> 16-May-2020 12:42      9M
D1 - Hardware Backdoors in x86 CPUs - Christoph..> 16-May-2020 12:42     12M
D1 - Owning Electronic Locks Without Leaving a ..> 16-May-2020 12:42     13M
D1 - Turning Memory Errors into Code Execution ..> 16-May-2020 12:42      1M
D1 COMMSEC - Breach Notification in Malaysia - ..> 16-May-2020 12:42      5M
D1 COMMSEC - Breaking Full Disk Encryption - Vi..> 16-May-2020 12:42      6M
D1 COMMSEC - Demystifying the Definitions of th..> 16-May-2020 12:42      3M
D1 COMMSEC - Generic and Static Detection of Mo..> 16-May-2020 12:42     10M
D1 COMMSEC - In the Trails of WINDSHIFT APT - T..> 16-May-2020 12:42      2M
D1 COMMSEC - KLara - Your New Friend - Dan Deme..> 16-May-2020 12:42      8M
D1 COMMSEC - Opening Remarks - Andrea Zapparoli..> 16-May-2020 12:42      1M
D1 COMMSEC - Securing ICS : SCADA - Defense in ..> 16-May-2020 12:42      3M
D1 COMMSEC - Surprise Rant 2.0 - Joern Schneewe..> 16-May-2020 12:42       0
D1 COMMSEC - WiFi, Phishing and Red Teaming - M..> 16-May-2020 12:42      1M
D1 KEYNOTE - (In)Security is Eating the World -..> 16-May-2020 12:42      9M
D2 - Decoding an iOS Vulnerability - Adam Donen..> 16-May-2020 12:42      3M
D2 - Hacking BLE Bicycle Locks for Fun and (a S..> 16-May-2020 12:42      5M
D2 - NFC Payments - The Art of Relay & Replay A..> 16-May-2020 12:42      3M
D2 - The Road to iOS Sandbox Escape - Rani Idan..> 16-May-2020 12:42      8M
D2 - Traversing the Kill-Chain - The New Shiny ..> 16-May-2020 12:42      3M
D2 COMMSEC - Blockchain and Smart Contract Atta..> 16-May-2020 12:42      2M
D2 COMMSEC - Cognitive Automation With Machine ..> 16-May-2020 12:42      5M
D2 COMMSEC - Data-Centric Cyber Threat Impact A..> 16-May-2020 12:42     12M
D2 COMMSEC - Hacking Mobile Games - Closing the..> 16-May-2020 12:42      3M
D2 COMMSEC - Internet of Things - Battle of the..> 16-May-2020 12:42      3M
D2 COMMSEC - Learning How to Smurf with Honeypo..> 16-May-2020 12:42      2M
D2 COMMSEC - Monitoring Native Execution in WoW..> 16-May-2020 12:42      2M
D2 COMMSEC - Software Security Era - Past, Pres..> 16-May-2020 12:42      3M
D2 COMMSEC - Using Machine Learning to Identify..> 16-May-2020 12:42      1M
D2 KEYNOTE - Machine Learning in Cybersecurity ..> 16-May-2020 12:42     17M
Exploiting Automation in LTE Mobile Networks - ..> 16-May-2020 12:42    562K
FILE Structures - Another Binary Exploitation T..> 16-May-2020 12:42      4M
Hardware Backdoors in x86 CPUs - Christopher Do..> 16-May-2020 12:42    634K
NFC Payments - The Art of Relay and Replay Atta..> 16-May-2020 12:42    663K
The Road to iOS Sandbox Escape - Rani Idan.pdf     16-May-2020 12:42    574K