Index of /materials/sg2017

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]COMMSEC D1 - Cesar Cerrudo and Lucas Apa - Hacking Robots Before Skynet.pdf2016-03-06 04:22 49M 
[   ]COMMSEC D1 - Florian Lukavsky and Wolfgang Ettlinger - Pwnrensics - How to Execute Code on a Forensic Workstation.pdf2016-03-06 04:22 1.1M 
[   ]COMMSEC D1 - Hamza Beghal - Threat Hunting 101 - Become the Hunter.pdf2016-03-06 04:22 8.2M 
[   ]COMMSEC D1 - Keisuke Hirata - AutoSec - Automotive Security Assessment Techniques and Tools from a Pentesters Perspective.pdf2016-03-06 04:22 2.4M 
[   ]COMMSEC D1 - Nick Biasini - Insecurity in 2017- 0-days Are The Least of Our Problems.pdf2016-03-06 04:22 11M 
[   ]COMMSEC D1 - Stefan Esser - The Original Elevat0r.pdf2016-03-06 04:22 1.9M 
[   ]COMMSEC D1 - Thomas Debize and Mahdi Braik - Hadoop Safari - Hunting for Vulnerabilities.pdf2016-03-06 04:22 2.4M 
[   ]COMMSEC D2 - Bai Guangdong and Zhang Qing - The Nightmare of Fragmentation - A Case Study of 200+ Vulnerabilities in Android Phones.pdf2016-03-06 04:22 4.7M 
[   ]COMMSEC D2 - Fadli B. Sidek - Facebook - The Deep & Dark Web for Threat Actors in Asia.pdf2016-03-06 04:22 13M 
[   ]COMMSEC D2 - Jim Geovedi - Unstructured Data is the New Gold - ML + NLP is the New Shiz.pdf2016-03-06 04:22 25M 
[   ]COMMSEC D2 - Joseph Hesse and Kamal Ranjan - Applying Intelligence and Counterintelligence Technique to CNO.pdf2016-03-06 04:22 1.0M 
[   ]COMMSEC D2 - Matteo Beccaro - Stealing PLC Intellectual Property - A Red Teaming Story.pdf2016-03-06 04:22 1.5M 
[   ]COMMSEC D2 - Maxwell Koh - 2FAssassin - Bypass 2FA, Stealing Private Keys, and More.pdf2016-03-06 04:22 4.0M 
[   ]COMMSEC D2 - Nicolas Collery - It's Friday Evening Professor Moriarty.pdf2016-03-06 04:22 10M 
[   ]COMMSEC D2 - Vitaly Kamluk and Wayne Lee - Searching for a Needle in a Remote Haystack.pdf2016-03-06 04:22 1.6M 
[   ]COMMSEC D2 - Xinhua Cai - Security Crowdsourcing - Growing Network Security Specialists for the Enterprise.pdf2016-03-06 04:22 10M 
[   ]D1 - A. Ermolov, D. Evdomikov and M. Malyutin - CVE-2017-5689 – How We Broke Intel AMT.pdf2016-03-06 04:22 2.4M 
[   ]D1 - Ashley Shen and Moonbeom Park - A Deep Dive into the Digital Weapons of the North Korean Cyber Army.pdf2016-03-06 04:22 24M 
[   ]D1 - Dmitry Chastuhin and Vladimir Egorov - Get to the Money - Hacking POS and POP Systems.pdf2016-03-06 04:22 11M 
[   ]D1 - Dominic Chell and Vincent Yiu - A Year In The Red.pdf2016-03-06 04:22 35M 
[   ]D1 - Orange Tsai - A New Era of SSRF – Exploiting URL Parsers in Trending Programming Languages.pdf2016-03-06 04:22 5.2M 
[   ]D1 - Veronica Valeros and Sebastian Garcia - A Modern Study of Microphone Bugs.pdf2016-03-06 04:22 9.2M 
[   ]D2 - Adam Donenfeld - Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox.pdf2016-03-06 04:22 3.4M 
[   ]D2 - Balazs Bucsay - XFLTReaT - A New Dimension in Tunnelling.pdf2016-03-06 04:22 45M 
[   ]D2 - Ivan Novikov - NeuralFuzz - Neural Networks for Fuzzing Web Apps.pdf2016-03-06 04:22 1.2M 
[   ]D2 - Matt Knight and Marc Newlin - Radio Exploitation 101 - Characterizing, Contextualizing, and Applying Wireless Attack Methods.pdf2016-03-06 04:22 25M 
[   ]D2 - Qiang Li and ZhiBin Hu - QEMU Attack Surface and Security Internals.pdf2016-03-06 04:22 2.5M 
[   ]KEYNOTE 1 - Mark Curphey - Finding Vulnerabilities and Malware in Open-Source Code at Scale.pdf2016-03-06 04:22 5.3M 
[   ]WELCOME ADDRESS - Earl Carter - IoT - A Security Hole Without a Patch.pdf2016-03-06 04:22 10M 
[   ]WHITEPAPER - A. Ermolov, D. Evdomikov and M. Malyutin - CVE-2017-5689 – How We Broke Intel AMT.pdf2016-03-06 04:22 2.3M 
[   ]WHITEPAPER - Adam Donenfeld - Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox.pdf2016-03-06 04:22 1.3M 
[   ]WHITEPAPER - Balazs Bucsay - XFLTReaT - A New Dimension in Tunnelling.pdf2016-03-06 04:22 814K 
[   ]WHITEPAPER - Dmitry Chastuhin and Vladimir Egorov - Get to the Money - Hacking POS and POP Systems.pdf2016-03-06 04:22 519K 
[   ]WHITEPAPER - Matt Knight and Marc Newlin - Radio Exploitation 101 - Characterizing, Contextualizing, and Applying Wireless Attack Methods.pdf2016-03-06 04:22 100K 
[   ]WHITEPAPER - Veronica Valeros and Sebastian Garcia - A Modern Study of Microphone Bugs.pdf2016-03-06 04:22 7.6M