Index of /materials/sg2016

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]KEYNOTE 2 - Katie Moussouris - Hacking the Pentagon - Bounty Creation Lessons - NO SLIDES.pdf2016-03-06 04:22 0  
[   ]D1 - Jonathan Levin - The Apple Sandbox - Deeper into the Quagmire.pdf2016-03-06 04:22 1.8M 
[   ]D2 - Moritz Jodeit -Look Mom I Don't Use Shellcode.pdf2016-03-06 04:22 2.0M 
[   ]D1 - Moonbeom Park and Youngjun Park - Understanding Your Opponent Attack Profiling.pdf2016-03-06 04:22 1.5M 
[   ]COMMSEC D2 - Rajchada Chanajitt - Forensic Analysis and Assessment of Android Banking Apps.pdf2016-03-06 04:22 24M 
[   ]D1 - Olga Kochetova and Alexey Osipov - ATMs and Their Dirty Little Secrets.pdf2016-03-06 04:22 1.9M 
[   ]COMMSEC D1 - Sanoop Thomas - Halcyon IDE.pdf2016-03-06 04:22 501K 
[   ]COMMSEC D1 - Michael Gianarakis - Reverse Engineering Swift Applications.pdf2016-03-06 04:22 2.0M 
[   ]COMMSEC D2 - Florian Lukavsky - Fake Presidents Fraud Defrauded.pdf2016-03-06 04:22 1.5M 
[   ]KEYNOTE 1 - Erin Jacobs - I Fight For the Users .pdf2016-03-06 04:22 61M 
[   ]COMMSEC D2 - Alfonso De Gregorio - A Code of Ethics for the Private Sector.pdf2016-03-06 04:22 17M 
[   ]D1 - Nguyen Anh Quynh - Keystone - A Next Generation Assembler Framework.pdf2016-03-06 04:22 1.8M 
[   ]D1 - Peter Pi - Attacking NVIDIA's Tegra Platform.pdf2016-03-06 04:22 726K 
[   ]D2 - Matteo Beccaro and Matteo Collura - Abusing Smart Cities.pdf2016-03-06 04:22 19M 
[   ]D2 - Stefan Esser - iOS 10 Kernel Heap Revisited.pdf2016-03-06 04:22 3.6M 
[   ]D2 - Koh Yong Chuan - Fuzzing the Windows Kernel.pdf2016-03-06 04:22 2.0M 
[   ]COMMSEC D2 - Vanessa Henderson - Copy-paste Vulnerabilities.pdf2016-03-06 04:22 327K 
[   ]D1 - Adam Donenfeld and Yaniv Mordekhay - Stumping The Mobile Chipset.pdf2016-03-06 04:22 4.1M 
[   ]D1 - Bernhard Mueller - Attacking Software Tokens.pdf2016-03-06 04:22 44M 
[   ]D2 - Shlomi Oberman and Ron Shina - Breaking Exploits with Practical Control Flow Integrity.pdf2016-03-06 04:22 3.8M 
[   ]COMMSEC D1 - Sweety Chauhan - Data Driven Software Security.pdf2016-03-06 04:22 1.4M 
[   ]COMMSEC D2 - Paul Craig - Local Privilege Escalation in 2016.pdf2016-03-06 04:22 2.9M 
[   ]COMMSEC D2 - Tan Kean Siong - IoT Honeypots.pdf2016-03-06 04:22 5.0M 
[DIR]whitepapers/2016-03-06 04:22 -