Index of /materials/sg2015

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]CLOSING NOTE - Dhillon Kannabhiran.pdf2016-03-06 04:22 183K 
[   ]D1 - Alfonso De Gregorio - Extortion and Cooperation in the Zero¬≠-Day Market.pdf2016-03-06 04:22 29M 
[   ]D1 - Chris Rouland - Understanding the IoT from DC to 10Ghz.pdf2016-03-06 04:22 22M 
[   ]D1 - Dawid Czagan - Hacking Cookies in Modern Web Applications and Browsers.pdf2016-03-06 04:22 75K 
[   ]D1 - Julien Lenoir - Implementing Your Own Generic Unpacker.pdf2016-03-06 04:22 2.3M 
[   ]D1 - Lyon Yang - Advanced SOHO Router Exploitation.pdf2016-03-06 04:22 9.8M 
[   ]D1 - Marina Krotofil - Hacking Chemical Plants for Competition and Extortion.pdf2016-03-06 04:22 19M 
[   ]D2 - Eleanor Saitta - Security Design and High Risk Users.pdf2016-03-06 04:22 1.2M 
[   ]D2 - Fatih Ozavci - VoIP Wars - Destroying Jar Jar Lync.pdf2016-03-06 04:22 4.8M 
[   ]D2 - Marco Balduzzi and Vincenzo Ciancaglini - Cybercrime in the Deep Web.pdf2016-03-06 04:22 8.4M 
[   ]D2 - Ryan Welton and Marco Grassi - Current State of Android Privilege Escalation.pdf2016-03-06 04:22 4.3M 
[   ]D2 - Valerie Thomas - Attacking Physical Access Systems.pdf2016-03-06 04:22 88M 
[   ]D2 - Xeno Kovah - Thunderstrike 2 - Sith Strike.pdf2016-03-06 04:22 52M 
[   ]D3 - Dmitry Chastuhin - SAP Afaria - One SMS to Hack a Company.pdf2016-03-06 04:22 15M 
[   ]D3 - Felix Wilhelm - Attacking the FireEye MPS.pdf2016-03-06 04:22 18M 
[   ]D3 - Katie Kleemola and Anthony Lai - Case Study of Targeted Attacks in Asia.pdf2016-03-06 04:22 11M 
[   ]D3 - Marc Heuse - Hiding in Complexity.pdf2016-03-06 04:22 823K 
[   ]D3 - Wen Xu - Root Hundreds and Thousands of Android Devices with One Generic Exploit.pdf2016-03-06 04:22 2.4M 
[   ]KEYNOTE 1 - Kristin Lovejoy - Our Daily Struggle to Balance National Security Interests and Civil Liberties at the Ground Level .pdf2016-03-06 04:22 3.3M 
[   ]KEYNOTE 2 - Ofir Arkin - Security in a World Out of Our Control - NO SLIDES.pdf2016-03-06 04:22 0  
[   ]KEYNOTE 3 - Winn Schwartau - Analogue Network Security.pdf2016-03-06 04:22 56M 
[   ]KEYNOTE 4 (CLOSING) - Barry Greene - Can Vendors Ever Provide Secure Solutions?.pdf2016-03-06 04:22 5.3M 
[DIR]tools/2016-03-06 04:22 -  
[DIR]whitepapers/2016-03-06 04:22 -