Index of /Meeting_Papers/HITB/2019/


../
D1 KEYNOTE - Sometimes They Come Hack - Dhillon..> 16-May-2020 12:43      5M
D1T1 - CSP - A Successful Mess Between Hardenin..> 16-May-2020 12:43      3M
D1T1 - MBUF-OFLOW - Finding Vulnerabilities in ..> 16-May-2020 12:43      3M
D1T1 - Make ARM Shellcode Great Again - Saumil ..> 16-May-2020 12:43     51M
D1T1 - Modern Techniques to Deobfuscate UEFI:BI..> 16-May-2020 12:43      3M
D1T1 - Pwning Centrally-Controlled Smart Homes ..> 16-May-2020 12:43     40M
D1T1 - SeasCoASA - Exploiting a Small Leak in a..> 16-May-2020 12:43      4M
D1T1 - The Birdman and Cospas-Sarsat Satellites..> 16-May-2020 12:43      7M
D1T1 - Toctou Attacks Against Secure Boot - Tra..> 16-May-2020 12:43     13M
D1T2 - Automated Discovery of Logical Privilege..> 16-May-2020 12:43     17M
D1T2 - Bypassing GSMA Recommendations on SS7 Ne..> 16-May-2020 12:43      3M
D1T2 - Duplicatinng Black Box Machine Learning ..> 16-May-2020 12:43      5M
D1T2 - Fresh Apples - Researching New Attack In..> 16-May-2020 12:43      5M
D1T2 - Hourglass Fuzz - A Quick Bug Hunting Met..> 16-May-2020 12:43      8M
D1T2 - Pwning HDMI for Fun and Profit - Jeongho..> 16-May-2020 12:43      5M
D1T2 - fn_fuzzy - Fast Multiple Binary Diffing ..> 16-May-2020 12:43      7M
D1T3 - Attacking GSM – Alarms, Smart Homes, Sma..> 16-May-2020 12:43    728K
D1T3 - How to Dump, Parse, and Analyze i.MX Fla..> 16-May-2020 12:43      3M
D1T3 - Reversing with Radare2 - Arnau Gamez Mon..> 16-May-2020 12:43      1M
D1T3 - Wireless Hacking with Hack Cube - Jie Fu..> 16-May-2020 12:43     13M
D2 KEYNOTE - Securing Journalists - Runa Sandvi..> 16-May-2020 12:43     91K
D2T1 - Attacking Industrial Remote Controllers ..> 16-May-2020 12:43      6M
D2T1 - Compiler Bugs and Bug Compilers - Marion..> 16-May-2020 12:43      4M
D2T1 - Hacking Jenkins - Orange Tsai.pdf           16-May-2020 12:43      4M
D2T1 - Muraena - The Unexpected Phish - Michele..> 16-May-2020 12:43     11M
D2T1 - Sneaking Past Device Guard - Philip Tsuk..> 16-May-2020 12:43      4M
D2T2 - Binder - The Bridge to Root - Hongli Han..> 16-May-2020 12:43     54M
D2T2 - Improving Unicode Encoding Attacks with ..> 16-May-2020 12:43      6M
D2T2 - ModJack - Hijacking the MacOS Kernel - Z..> 16-May-2020 12:43     13M
D2T2 - PanicXNU 3.0 - Juwei Lin & Junzhi Lu.pdf    16-May-2020 12:43     20M
D2T2 - Reversing Cryptographic Primitives Using..> 16-May-2020 12:43      2M
HAXPO D1 - A Decade of Infosec Tools - Thomas D..> 16-May-2020 12:43      1M
HAXPO D1 - Building an International Coordinate..> 16-May-2020 12:43      3M
HAXPO D1 - Ghost Tunnel 2.0 - Blue Ghost - Yong..> 16-May-2020 12:43      4M
HAXPO D1 - Hacking LTE Public Warning Systems -..> 16-May-2020 12:43     22M
HAXPO D1 - Hacking the 0day Market - Andrea Zap..> 16-May-2020 12:43      4M
HAXPO D1 - Hiding a Secret Distributed Chat Sys..> 16-May-2020 12:43      6M
HAXPO D1 - Infrared - Old Threats Meets New Dev..> 16-May-2020 12:43     19M
HAXPO D1 - Social Networks - Can We Fix Them - ..> 16-May-2020 12:43     37M
HAXPO D1 - VoLTE Phreaking - Ralph Moonen.pdf      16-May-2020 12:43      5M
HAXPO D1 - WiCy - Monitoring 802.11AC Networks ..> 16-May-2020 12:43      4M
HAXPO D2 - Attacking Encrypted VoIP Protocols -..> 16-May-2020 12:43      9M
HAXPO D2 - Demystifying IoT:OT Hacks With SDR -..> 16-May-2020 12:43    921K
HAXPO D2 - Implementation and Evaluation of Sec..> 16-May-2020 12:43     17M
HAXPO D2 - The Red Flavour of SOC Automation an..> 16-May-2020 12:43     26M