Index of /Meeting_Papers/HITB/2019/


../
D1 KEYNOTE - Sometimes They Come Hack - Dhillon..> 05-Mar-2021 00:50      5M
D1T1 - CSP - A Successful Mess Between Hardenin..> 05-Mar-2021 00:50      3M
D1T1 - MBUF-OFLOW - Finding Vulnerabilities in ..> 05-Mar-2021 00:51      3M
D1T1 - Make ARM Shellcode Great Again - Saumil ..> 05-Mar-2021 00:50     51M
D1T1 - Modern Techniques to Deobfuscate UEFI:BI..> 05-Mar-2021 00:50      3M
D1T1 - Pwning Centrally-Controlled Smart Homes ..> 05-Mar-2021 00:50     40M
D1T1 - SeasCoASA - Exploiting a Small Leak in a..> 05-Mar-2021 00:51      4M
D1T1 - The Birdman and Cospas-Sarsat Satellites..> 05-Mar-2021 00:50      7M
D1T1 - Toctou Attacks Against Secure Boot - Tra..> 05-Mar-2021 00:51     13M
D1T2 - Automated Discovery of Logical Privilege..> 05-Mar-2021 00:50     17M
D1T2 - Bypassing GSMA Recommendations on SS7 Ne..> 05-Mar-2021 00:51      3M
D1T2 - Duplicatinng Black Box Machine Learning ..> 05-Mar-2021 00:50      5M
D1T2 - Fresh Apples - Researching New Attack In..> 05-Mar-2021 00:50      5M
D1T2 - Hourglass Fuzz - A Quick Bug Hunting Met..> 05-Mar-2021 00:50      8M
D1T2 - Pwning HDMI for Fun and Profit - Jeongho..> 05-Mar-2021 00:50      5M
D1T2 - fn_fuzzy - Fast Multiple Binary Diffing ..> 05-Mar-2021 00:50      7M
D1T3 - Attacking GSM – Alarms, Smart Homes, Sma..> 05-Mar-2021 00:50    728K
D1T3 - How to Dump, Parse, and Analyze i.MX Fla..> 05-Mar-2021 00:51      3M
D1T3 - Reversing with Radare2 - Arnau Gamez Mon..> 05-Mar-2021 00:50      1M
D1T3 - Wireless Hacking with Hack Cube - Jie Fu..> 05-Mar-2021 00:50     13M
D2 KEYNOTE - Securing Journalists - Runa Sandvi..> 05-Mar-2021 00:50     91K
D2T1 - Attacking Industrial Remote Controllers ..> 05-Mar-2021 00:50      6M
D2T1 - Compiler Bugs and Bug Compilers - Marion..> 05-Mar-2021 00:51      4M
D2T1 - Hacking Jenkins - Orange Tsai.pdf           05-Mar-2021 00:51      4M
D2T1 - Muraena - The Unexpected Phish - Michele..> 05-Mar-2021 00:51     11M
D2T1 - Sneaking Past Device Guard - Philip Tsuk..> 05-Mar-2021 00:50      4M
D2T2 - Binder - The Bridge to Root - Hongli Han..> 05-Mar-2021 00:50     54M
D2T2 - Improving Unicode Encoding Attacks with ..> 05-Mar-2021 00:50      6M
D2T2 - ModJack - Hijacking the MacOS Kernel - Z..> 05-Mar-2021 00:50     13M
D2T2 - PanicXNU 3.0 - Juwei Lin & Junzhi Lu.pdf    05-Mar-2021 00:50     20M
D2T2 - Reversing Cryptographic Primitives Using..> 05-Mar-2021 00:50      2M
HAXPO D1 - A Decade of Infosec Tools - Thomas D..> 05-Mar-2021 00:50      1M
HAXPO D1 - Building an International Coordinate..> 05-Mar-2021 00:50      3M
HAXPO D1 - Ghost Tunnel 2.0 - Blue Ghost - Yong..> 05-Mar-2021 00:50      4M
HAXPO D1 - Hacking LTE Public Warning Systems -..> 05-Mar-2021 00:50     22M
HAXPO D1 - Hacking the 0day Market - Andrea Zap..> 05-Mar-2021 00:51      4M
HAXPO D1 - Hiding a Secret Distributed Chat Sys..> 05-Mar-2021 00:50      6M
HAXPO D1 - Infrared - Old Threats Meets New Dev..> 05-Mar-2021 00:50     19M
HAXPO D1 - Social Networks - Can We Fix Them - ..> 05-Mar-2021 00:51     37M
HAXPO D1 - VoLTE Phreaking - Ralph Moonen.pdf      05-Mar-2021 00:50      5M
HAXPO D1 - WiCy - Monitoring 802.11AC Networks ..> 05-Mar-2021 00:50      4M
HAXPO D2 - Attacking Encrypted VoIP Protocols -..> 05-Mar-2021 00:50      9M
HAXPO D2 - Demystifying IoT:OT Hacks With SDR -..> 05-Mar-2021 00:50    921K
HAXPO D2 - Implementation and Evaluation of Sec..> 05-Mar-2021 00:49     17M
HAXPO D2 - The Red Flavour of SOC Automation an..> 05-Mar-2021 00:50     26M