Index of /materials/sg2015
Name
Last modified
Size
Description
Parent Directory
-
tools/
2016-03-06 04:22
-
whitepapers/
2016-03-06 04:22
-
KEYNOTE 2 - Ofir Arkin - Security in a World Out of Our Control - NO SLIDES.pdf
2016-03-06 04:22
0
D1 - Dawid Czagan - Hacking Cookies in Modern Web Applications and Browsers.pdf
2016-03-06 04:22
75K
CLOSING NOTE - Dhillon Kannabhiran.pdf
2016-03-06 04:22
183K
D3 - Marc Heuse - Hiding in Complexity.pdf
2016-03-06 04:22
823K
D2 - Eleanor Saitta - Security Design and High Risk Users.pdf
2016-03-06 04:22
1.2M
D1 - Julien Lenoir - Implementing Your Own Generic Unpacker.pdf
2016-03-06 04:22
2.3M
D3 - Wen Xu - Root Hundreds and Thousands of Android Devices with One Generic Exploit.pdf
2016-03-06 04:22
2.4M
KEYNOTE 1 - Kristin Lovejoy - Our Daily Struggle to Balance National Security Interests and Civil Liberties at the Ground Level .pdf
2016-03-06 04:22
3.3M
D2 - Ryan Welton and Marco Grassi - Current State of Android Privilege Escalation.pdf
2016-03-06 04:22
4.3M
D2 - Fatih Ozavci - VoIP Wars - Destroying Jar Jar Lync.pdf
2016-03-06 04:22
4.8M
KEYNOTE 4 (CLOSING) - Barry Greene - Can Vendors Ever Provide Secure Solutions?.pdf
2016-03-06 04:22
5.3M
D2 - Marco Balduzzi and Vincenzo Ciancaglini - Cybercrime in the Deep Web.pdf
2016-03-06 04:22
8.4M
D1 - Lyon Yang - Advanced SOHO Router Exploitation.pdf
2016-03-06 04:22
9.8M
D3 - Katie Kleemola and Anthony Lai - Case Study of Targeted Attacks in Asia.pdf
2016-03-06 04:22
11M
D3 - Dmitry Chastuhin - SAP Afaria - One SMS to Hack a Company.pdf
2016-03-06 04:22
15M
D3 - Felix Wilhelm - Attacking the FireEye MPS.pdf
2016-03-06 04:22
18M
D1 - Marina Krotofil - Hacking Chemical Plants for Competition and Extortion.pdf
2016-03-06 04:22
19M
D1 - Chris Rouland - Understanding the IoT from DC to 10Ghz.pdf
2016-03-06 04:22
22M
D1 - Alfonso De Gregorio - Extortion and Cooperation in the Zero-Day Market.pdf
2016-03-06 04:22
29M
D2 - Xeno Kovah - Thunderstrike 2 - Sith Strike.pdf
2016-03-06 04:22
52M
KEYNOTE 3 - Winn Schwartau - Analogue Network Security.pdf
2016-03-06 04:22
56M
D2 - Valerie Thomas - Attacking Physical Access Systems.pdf
2016-03-06 04:22
88M