Index of /files/hitbsecconf2018ams/materials

[ICO]NameLast modifiedSizeDescription
[PARENTDIR]Parent Directory  -  [   ]CLOSING KEYNOTE - Amber Baldet - Security is What We Make of It - Blockchain and Beyond.pdf2018-04-13 13:33 2.1M [   ]D1 COMMSEC - Dhia Mahjoub and Sarah Brown - Privacy and Protection for Criminals - Behaviors and Patterns of Rogue Hosting Providers.pdf2018-04-12 07:06 2.6M [   ]D1 COMMSEC - Josh Stroschein - A Deep Dive Into Malicious Documents.pdf2018-04-12 12:45 15M [   ]D1 COMMSEC - Kelvin Wong - How to Find and Exploit Bugs in IoT Devices.pdf2018-04-12 11:01 27M [   ]D1 COMMSEC - Niels van Dijkhuizen - Keynterceptor - Press Any Key to Continue.pdf2018-04-12 09:42 3.2M [   ]D1 COMMSEC - Ofir Arkin - Creating an Isolated Data Center Security Policy Model Using SmartNICs.pdf2018-04-12 09:47 10M [   ]D1 COMMSEC - Saif Elsherei and Ian Kronquist - The Life & Death of Kernel Object Abuse.pdf2018-04-12 05:33 2.0M [   ]D1 COMMSEC - Steffen Wendzel - Steganography Ante Portas.pdf2018-04-12 10:50 63M [   ]D1 COMMSEC - Stephen Hilt - Hacking IoT Speakers.pdf2018-04-12 13:09 75M [   ]D1 COMMSEC - Thomas Debize - Modern Pentest Tricks for Faster, Wider, Greater Engagements.pdf2018-04-12 11:39 1.3M [   ]D1T1 - Areum Lee & Jeonghoon Shin - Fuzzing Javascript Engines for Fun and Pwnage.pdf2018-04-12 13:04 4.6M [   ]D1T1 - Don Bailey - Sneaky Element- Real World Attacks Against Secure Elements.pdf2018-04-12 05:48 2.3M [   ]D1T1 - Federico Dotta and Piergiovanni Cipolloni - Brida When Burp Suite Meets Frida.pdf2018-04-12 07:03 3.6M [   ]D1T1 - Jun Li, Kunzhe Chai and Hongjian Cao - Ghost Tunnel- Covert Data Exfiltration Channel to Circumvent Air Gapping.pdf2018-04-12 09:03 6.0M [   ]D1T1 - V. Kropotov, F. Yarochkin, M. Fuentes, L. Gu - Abusing the Travel and Hospitality Industry for Profit.pdf2018-04-12 10:46 34M [   ]D1T1 - Xiaolong Bai & Min Spark Zheng - How to Analyze and Find Bugs in MacOS and iOS Kernel Drivers.pdf2018-04-12 11:47 22M [   ]D1T2 - Bernhard Mueller - Smashing Ethereum Smart Contracts for Fun and ACTUAL Profit.pdf2018-04-13 10:25 2.0M [   ]D1T2 - Daniel Bohannon - Invoke-DOSfuscation.pdf2018-04-12 09:42 6.5M [   ]D1T2 - Eugene Neyolov - Applying Machine Learning to User Behavior Anomaly Analysis.pdf2018-04-13 01:25 8.7M [   ]D1T2 - Yong Wang & Yang Song - Rooting Android 8 with a Kernel Space Mirroring Attack.pdf2018-04-12 11:47 9.0M [   ]D1T2 - Yu Hong and Shikang Xing - Attacking Microsoft’s .NET Framework Through CLR.pdf2018-04-12 07:09 3.2M [   ]D1T2 - YuXiang Li, HuiYu Wu & Yong Yang - Hacking Intelligent Buildings - Pwning KNX & ZigBee Networks.pdf2018-04-12 10:41 15M [   ]D1T3 - Didier Stevens - SDR Lab.pdf2018-04-12 11:04 700K [   ]D1T3 - Maria Markstedter - From Zero to ARM Assembly Bind Shellcode.pdf2018-04-12 10:43 3.7M [   ]D1T3 - Yunding Jian, Jie Fu & Chaoran Wang - Wireless Hacking with HackCUBE.pdf2018-04-12 13:07 1.8M [   ]D2 COMMSEC - Asaf Cohen & Ofir Kamil - Hacking a Hospital for Fun and Profit.pdf2018-04-13 09:32 3.5M [   ]D2 COMMSEC - Ben Schmidt - Smart Contract (in)security.pdf2018-04-13 10:16 3.8M [   ]D2 COMMSEC - Jeremy Brown - ProdSec - A Technical Approach.pdf2018-04-13 13:32 4.1M [   ]D2 COMMSEC - Kyeong Joo Jung - Hiding Tasks via Hardware Task Switching.pdf2018-04-13 06:01 1.0M [   ]D2 COMMSEC - Ricardo J. Rodriguez & Daniel Uroz - Automatic Generation of ROP Chains Using a Turing-Complete Instruction Set.pdf2018-04-13 09:33 1.4M [   ]D2T1 - Alfonso Munoz & Jorge Cuadrado - Establishing Covert Channels by Abusing GSM AT Commands.pdf2018-04-13 10:32 6.6M [   ]D2T1 - Aviv Grafi & Amit Dori - Sandbox Evasion Using VBA Referencing.pdf2018-04-13 05:30 1.3M [   ]D2T1 - Karsten Nohl & Jakob Lell - Uncovering the Android Patch Gap Through Binary-Only Patch Level Analysis.pdf2018-04-13 06:40 2.5M [   ]D2T1 - Philip Tsukerman - Expanding Your WMI Lateral Movement Arsenal.pdf2018-04-13 11:22 16M [   ]D2T1 - Sheila Ayelen Berta & Claudio Caracciolo - Backdooring & Remotely Controlling Cars With The Bicho.pdf2018-04-13 09:12 4.7M [   ]D2T2 - Fernando Arnaboldi - Exposing Hidden Exploitable Behaviors Using Extended Differential Fuzzing.pdf2018-04-13 10:32 3.9M [   ]D2T2 - Rancho Han - Pwning The Windows Kernel.pdf2018-04-13 06:46 1.6M [   ]D2T2 - Rogan Dawes - Towards a Generic Interecepting Proxy.pptx2018-04-13 09:23 27M [   ]D2T2 - Zhang Qing & Bai Guangdong - A New Fuzzing Method for Android.pdf2018-04-13 09:16 3.2M [   ]D2T3 - David Rodriguez, Jingchuan Chen & Dhia Mahjoub - Predicting Malicious Domains Using Convolutional Neural Networks.pdf2018-04-13 11:08 1.6M [   ]D2T3 - Jonathan Levin - Lend Me Your kernel_task Port.pdf2018-04-13 06:40 1.7M [   ]KEYNOTE 1 - Marion Marschalek - The Future, The Past, and … Wait, Where the Hell are We Now.pdf2018-04-12 05:27 2.8M [   ]KEYNOTE 2 - Jennifer Leggio - A Risk Assessment of Logo Disclosures.pdf2018-04-13 13:33 24M [   ]WELCOME ADDRESS - Michel van Eeten - Hacks, Sticks, and Carrots - Improving Incentives for Cybersecurity.pdf2018-04-12 03:13 3.3M [DIR]WHITEPAPERS/2018-04-13 06:05 -  

为您推荐了相关的技术文章:

  1. Index of /materials/sg2018
  2. Index of /files/hitbsecconf2018dxb/materials
  3. Tiki-Wiki, sysPass XSS Filter Bypass
  4. Pentest Tips and Tricks
  5. 0x4D31/awesome-threat-detection: A curated list of awesome threat detection and hunting resources

原文链接: conference.hitb.org