![]() | Name | Last modified | Size | Description |
---|---|---|---|---|
![]() | Parent Directory | - | ||
![]() | A Code of Ethics for the Private Sector - Alfonso De Gregorio.pdf | 2016-03-06 04:22 | 160K | |
![]() | ATMs and Their Dirty Little Secrets - Olga Kochetova & Alexey Osipov.pdf | 2016-03-06 04:22 | 474K | |
![]() | Abusing Smart Cities - Matteo Beccaro and Matteo Collura.pdf | 2016-03-06 04:22 | 1.4M | |
![]() | Attacking NVIDIA's Tegra Platform - Peter Pi.pdf | 2016-03-06 04:22 | 389K | |
![]() | Breaking Exploits with Practical Control Flow Integrity - Shlomi Oberman and Ron Shina.pdf | 2016-03-06 04:22 | 102K | |
![]() | Hacking Soft Tokens - Bernhard Mueller.pdf | 2016-03-06 04:22 | 6.0M | |
![]() | Look Mom - I Don't Use Shellcode - Moritz Jodeit.pdf | 2016-03-06 04:22 | 1.3M | |
![]() | Stumping The Mobile Chipset - Adam Donenfeld and Yaniv Modekhay.pdf | 2016-03-06 04:22 | 1.1M | |
![]() | Understanding Your Opponent - Attack Profiling - Moonbeom Park and Youngun Park.pdf | 2016-03-06 04:22 | 620K | |