Index of /materials/sg2016

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]COMMSEC D1 - Michael Gianarakis - Reverse Engineering Swift Applications.pdf2016-08-25 10:02 2.0M 
[   ]COMMSEC D1 - Sanoop Thomas - Halcyon IDE.pdf2016-08-25 10:02 501K 
[   ]COMMSEC D1 - Sweety Chauhan - Data Driven Software Security.pdf2016-08-25 08:39 1.4M 
[   ]COMMSEC D2 - Alfonso De Gregorio - A Code of Ethics for the Private Sector.pdf2016-08-26 09:46 17M 
[   ]COMMSEC D2 - Florian Lukavsky - Fake Presidents Fraud Defrauded.pdf2016-08-26 09:37 1.5M 
[   ]COMMSEC D2 - Paul Craig - Local Privilege Escalation in 2016.pdf2016-08-27 09:10 2.9M 
[   ]COMMSEC D2 - Rajchada Chanajitt - Forensic Analysis and Assessment of Android Banking Apps.pdf2016-08-29 05:06 24M 
[   ]COMMSEC D2 - Tan Kean Siong - IoT Honeypots.pdf2016-08-26 10:57 5.0M 
[   ]COMMSEC D2 - Vanessa Henderson - Copy-paste Vulnerabilities.pdf2016-08-26 08:26 327K 
[   ]D1 - Adam Donenfeld and Yaniv Mordekhay - Stumping The Mobile Chipset.pdf2016-08-26 05:30 4.1M 
[   ]D1 - Bernhard Mueller - Attacking Software Tokens.pdf2016-08-25 08:30 44M 
[   ]D1 - Jonathan Levin - The Apple Sandbox - Deeper into the Quagmire.pdf2016-08-25 10:05 1.8M 
[   ]D1 - Moonbeom Park and Youngjun Park - Understanding Your Opponent Attack Profiling.pdf2016-08-25 07:45 1.5M 
[   ]D1 - Nguyen Anh Quynh - Keystone - A Next Generation Assembler Framework.pdf2016-08-25 11:28 1.8M 
[   ]D1 - Olga Kochetova and Alexey Osipov - ATMs and Their Dirty Little Secrets.pdf2016-08-25 12:02 1.9M 
[   ]D1 - Peter Pi - Attacking NVIDIA's Tegra Platform.pdf2016-08-25 07:48 726K 
[   ]D2 - Koh Yong Chuan - Fuzzing the Windows Kernel.pdf2016-08-26 05:18 2.0M 
[   ]D2 - Matteo Beccaro and Matteo Collura - Abusing Smart Cities.pdf2016-08-26 06:16 19M 
[   ]D2 - Moritz Jodeit -Look Mom I Don't Use Shellcode.pdf2016-08-26 11:11 2.0M 
[   ]D2 - Shlomi Oberman and Ron Shina - Breaking Exploits with Practical Control Flow Integrity.pdf2016-08-26 08:39 3.8M 
[   ]D2 - Stefan Esser - iOS 10 Kernel Heap Revisited.pdf2016-08-26 10:57 3.6M 
[   ]KEYNOTE 1 - Erin Jacobs - I Fight For the Users .pdf2016-08-25 03:50 61M 
[   ]KEYNOTE 2 - Katie Moussouris - Hacking the Pentagon - Bounty Creation Lessons - NO SLIDES.pdf2016-08-26 05:20 0  
[DIR]whitepapers/2016-08-26 11:11 -  

Apache/2.4.7 (Ubuntu) Server at gsec.hitb.org Port 80