Index of /materials/sg2015

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]CLOSING NOTE - Dhillon Kannabhiran.pdf2015-10-16 12:33 183K 
[   ]D1 - Alfonso De Gregorio - Extortion and Cooperation in the Zero¬≠-Day Market.pdf2015-10-14 11:13 29M 
[   ]D1 - Chris Rouland - Understanding the IoT from DC to 10Ghz.pdf2015-10-14 12:23 22M 
[   ]D1 - Dawid Czagan - Hacking Cookies in Modern Web Applications and Browsers.pdf2015-10-14 06:40 75K 
[   ]D1 - Julien Lenoir - Implementing Your Own Generic Unpacker.pdf2015-10-14 05:53 2.3M 
[   ]D1 - Lyon Yang - Advanced SOHO Router Exploitation.pdf2015-10-14 08:40 9.8M 
[   ]D1 - Marina Krotofil - Hacking Chemical Plants for Competition and Extortion.pdf2015-10-14 10:02 19M 
[   ]D2 - Eleanor Saitta - Security Design and High Risk Users.pdf2015-10-15 12:12 1.2M 
[   ]D2 - Fatih Ozavci - VoIP Wars - Destroying Jar Jar Lync.pdf2015-11-26 04:44 4.8M 
[   ]D2 - Marco Balduzzi and Vincenzo Ciancaglini - Cybercrime in the Deep Web.pdf2015-10-15 05:35 8.4M 
[   ]D2 - Ryan Welton and Marco Grassi - Current State of Android Privilege Escalation.pdf2015-10-15 13:17 4.3M 
[   ]D2 - Valerie Thomas - Attacking Physical Access Systems.pdf2015-10-15 09:46 88M 
[   ]D2 - Xeno Kovah - Thunderstrike 2 - Sith Strike.pdf2015-10-16 04:25 52M 
[   ]D3 - Dmitry Chastuhin - SAP Afaria - One SMS to Hack a Company.pdf2015-10-16 05:16 15M 
[   ]D3 - Felix Wilhelm - Attacking the FireEye MPS.pdf2015-10-16 11:26 18M 
[   ]D3 - Katie Kleemola and Anthony Lai - Case Study of Targeted Attacks in Asia.pdf2015-10-16 08:56 11M 
[   ]D3 - Marc Heuse - Hiding in Complexity.pdf2015-10-16 06:18 823K 
[   ]D3 - Wen Xu - Root Hundreds and Thousands of Android Devices with One Generic Exploit.pdf2015-10-16 09:29 2.4M 
[   ]KEYNOTE 1 - Kristin Lovejoy - Our Daily Struggle to Balance National Security Interests and Civil Liberties at the Ground Level .pdf2015-10-14 05:17 3.3M 
[   ]KEYNOTE 2 - Ofir Arkin - Security in a World Out of Our Control - NO SLIDES.pdf2015-10-15 10:53 0  
[   ]KEYNOTE 3 - Winn Schwartau - Analogue Network Security.pdf2015-10-16 08:32 56M 
[   ]KEYNOTE 4 (CLOSING) - Barry Greene - Can Vendors Ever Provide Secure Solutions?.pdf2015-10-16 12:31 5.3M 
[DIR]tools/2015-11-26 04:46 -  
[DIR]whitepapers/2016-04-03 07:14 -  

Apache/2.4.7 (Ubuntu) Server at gsec.hitb.org Port 80