Index of /materials/sg2018
Name
Last modified
Size
Description
Parent Directory
-
CLOSING KEYNOTE - Rethinking The Cyber Kill Chain - Alexis Lavi.pdf
2018-08-31 05:49
255K
CLOSING NOTE - Philippe Viola.pdf
2018-09-03 19:31
255K
D1 - A First Look Into The Security of The Apple Pencil and the Apple SmartKeyboard - Stefan Esser.pdf
2018-08-30 06:00
2.9M
D1 - A Year of Purple - Ryan Shepherd.pdf
2018-08-29 23:23
7.4M
D1 - Exploiting Automation in LTE Mobile Networks - Altaf Shaik & Ravishankar Borgaonkar.pdf
2018-08-30 06:14
1.6M
D1 - FILE Structures - Another Binary Exploitation Technique - An-Jie Yang.pdf
2018-08-30 03:54
8.6M
D1 - Hardware Backdoors in x86 CPUs - Christopher Domas.pdf
2018-08-30 00:49
12M
D1 - Owning Electronic Locks Without Leaving a Trace - Tomi Tuominen & Timo Hirvonen.pdf
2018-08-30 03:16
13M
D1 - Turning Memory Errors into Code Execution with Client-Side Compilers - Robert Gawlik.pdf
2018-08-30 00:11
1.4M
D1 COMMSEC - Breach Notification in Malaysia - Keith Rozario.pdf
2018-09-03 20:00
4.6M
D1 COMMSEC - Breaking Full Disk Encryption - Vitaly Kamluk & Nicolas Collery.pdf
2018-08-30 00:47
5.5M
D1 COMMSEC - Demystifying the Definitions of the Surface Deep and Dark Web - Fadli Sidek.pdf
2018-08-30 00:05
2.6M
D1 COMMSEC - Generic and Static Detection of Mobile Malware Using Machine Learning - Minh Tran.pdf
2018-08-30 02:59
10M
D1 COMMSEC - In the Trails of WINDSHIFT APT - Taha Karim.pdf
2018-08-30 06:19
2.4M
D1 COMMSEC - KLara - Your New Friend - Dan Demeter.pdf
2018-08-29 23:41
8.5M
D1 COMMSEC - Opening Remarks - Andrea Zapparoli Manzoni.pdf
2018-08-29 22:54
1.2M
D1 COMMSEC - Securing ICS : SCADA - Defense in Depth - Mike Rebultan.pdf
2018-08-30 02:59
3.3M
D1 COMMSEC - Surprise Rant 2.0 - Joern Schneeweisz - NO SLIDES.pdf
2018-08-30 06:27
0
D1 COMMSEC - WiFi, Phishing and Red Teaming - Matteo Beccaro.pdf
2018-08-30 00:53
1.0M
D1 KEYNOTE - (In)Security is Eating the World - Michael Coates.pdf
2018-08-29 22:51
8.9M
D2 - Decoding an iOS Vulnerability - Adam Donenfeld.pdf
2018-08-31 00:36
2.8M
D2 - Hacking BLE Bicycle Locks for Fun and (a Small) Profit - Vincent Tan.pdf
2018-08-30 23:27
4.6M
D2 - NFC Payments - The Art of Relay & Replay Attacks - Salvador Mendoza.pdf
2018-08-31 03:38
2.9M
D2 - The Road to iOS Sandbox Escape - Rani Idan.pdf
2018-08-31 02:44
8.2M
D2 - Traversing the Kill-Chain - The New Shiny in 2018 - Vincent Yiu.pdf
2018-08-31 05:36
2.9M
D2 COMMSEC - Blockchain and Smart Contract Attack Vectors - Jorden Seet.pdf
2018-08-31 05:03
1.5M
D2 COMMSEC - Cognitive Automation With Machine Learning in Cyber Security - Rishi Kant.pdf
2018-08-31 00:16
5.4M
D2 COMMSEC - Data-Centric Cyber Threat Impact Analyser for IoT and Manufacturing - Simon Eng & Lim Eng Woei.pdf
2018-08-31 00:14
12M
D2 COMMSEC - Hacking Mobile Games - Closing the Gap Between Ikan Bilis and Whales - Nicholas Lim.pdf
2018-08-31 05:02
2.7M
D2 COMMSEC - Internet of Things - Battle of the Bots - Rommel Joven.pdf
2018-08-31 02:47
2.6M
D2 COMMSEC - Learning How to Smurf with Honeypots - Emil Tan.pdf
2018-08-31 03:29
2.0M
D2 COMMSEC - Monitoring Native Execution in WoW64 Applications - Assaf Carlsbad & Yarden Shafir.pdf
2018-08-30 23:29
2.1M
D2 COMMSEC - Software Security Era - Past, Present and Future - Nafiez & Jaan Yeh.pdf
2018-08-31 03:58
3.4M
D2 COMMSEC - Using Machine Learning to Identify Security Issues in Open-Source Libraries - Asankhaya Sharma.pdf
2018-08-31 03:22
1.2M
D2 KEYNOTE - Machine Learning in Cybersecurity - Alexander Polyakov.pdf
2018-08-30 22:13
17M
WHITEPAPERS/
2018-09-03 20:07
-