Index of /materials/sg2018

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]CLOSING KEYNOTE - Rethinking The Cyber Kill Chain - Alexis Lavi.pdf2018-08-31 05:49 255K 
[   ]CLOSING NOTE - Philippe Viola.pdf2018-09-03 19:31 255K 
[   ]D1 - A First Look Into The Security of The Apple Pencil and the Apple SmartKeyboard - Stefan Esser.pdf2018-08-30 06:00 2.9M 
[   ]D1 - A Year of Purple - Ryan Shepherd.pdf2018-08-29 23:23 7.4M 
[   ]D1 - Exploiting Automation in LTE Mobile Networks - Altaf Shaik & Ravishankar Borgaonkar.pdf2018-08-30 06:14 1.6M 
[   ]D1 - FILE Structures - Another Binary Exploitation Technique - An-Jie Yang.pdf2018-08-30 03:54 8.6M 
[   ]D1 - Hardware Backdoors in x86 CPUs - Christopher Domas.pdf2018-08-30 00:49 12M 
[   ]D1 - Owning Electronic Locks Without Leaving a Trace - Tomi Tuominen & Timo Hirvonen.pdf2018-08-30 03:16 13M 
[   ]D1 - Turning Memory Errors into Code Execution with Client-Side Compilers - Robert Gawlik.pdf2018-08-30 00:11 1.4M 
[   ]D1 COMMSEC - Breach Notification in Malaysia - Keith Rozario.pdf2018-09-03 20:00 4.6M 
[   ]D1 COMMSEC - Breaking Full Disk Encryption - Vitaly Kamluk & Nicolas Collery.pdf2018-08-30 00:47 5.5M 
[   ]D1 COMMSEC - Demystifying the Definitions of the Surface Deep and Dark Web - Fadli Sidek.pdf2018-08-30 00:05 2.6M 
[   ]D1 COMMSEC - Generic and Static Detection of Mobile Malware Using Machine Learning - Minh Tran.pdf2018-08-30 02:59 10M 
[   ]D1 COMMSEC - In the Trails of WINDSHIFT APT - Taha Karim.pdf2018-08-30 06:19 2.4M 
[   ]D1 COMMSEC - KLara - Your New Friend - Dan Demeter.pdf2018-08-29 23:41 8.5M 
[   ]D1 COMMSEC - Opening Remarks - Andrea Zapparoli Manzoni.pdf2018-08-29 22:54 1.2M 
[   ]D1 COMMSEC - Securing ICS : SCADA - Defense in Depth - Mike Rebultan.pdf2018-08-30 02:59 3.3M 
[   ]D1 COMMSEC - Surprise Rant 2.0 - Joern Schneeweisz - NO SLIDES.pdf2018-08-30 06:27 0  
[   ]D1 COMMSEC - WiFi, Phishing and Red Teaming - Matteo Beccaro.pdf2018-08-30 00:53 1.0M 
[   ]D1 KEYNOTE - (In)Security is Eating the World - Michael Coates.pdf2018-08-29 22:51 8.9M 
[   ]D2 - Decoding an iOS Vulnerability - Adam Donenfeld.pdf2018-08-31 00:36 2.8M 
[   ]D2 - Hacking BLE Bicycle Locks for Fun and (a Small) Profit - Vincent Tan.pdf2018-08-30 23:27 4.6M 
[   ]D2 - NFC Payments - The Art of Relay & Replay Attacks - Salvador Mendoza.pdf2018-08-31 03:38 2.9M 
[   ]D2 - The Road to iOS Sandbox Escape - Rani Idan.pdf2018-08-31 02:44 8.2M 
[   ]D2 - Traversing the Kill-Chain - The New Shiny in 2018 - Vincent Yiu.pdf2018-08-31 05:36 2.9M 
[   ]D2 COMMSEC - Blockchain and Smart Contract Attack Vectors - Jorden Seet.pdf2018-08-31 05:03 1.5M 
[   ]D2 COMMSEC - Cognitive Automation With Machine Learning in Cyber Security - Rishi Kant.pdf2018-08-31 00:16 5.4M 
[   ]D2 COMMSEC - Data-Centric Cyber Threat Impact Analyser for IoT and Manufacturing - Simon Eng & Lim Eng Woei.pdf2018-08-31 00:14 12M 
[   ]D2 COMMSEC - Hacking Mobile Games - Closing the Gap Between Ikan Bilis and Whales - Nicholas Lim.pdf2018-08-31 05:02 2.7M 
[   ]D2 COMMSEC - Internet of Things - Battle of the Bots - Rommel Joven.pdf2018-08-31 02:47 2.6M 
[   ]D2 COMMSEC - Learning How to Smurf with Honeypots - Emil Tan.pdf2018-08-31 03:29 2.0M 
[   ]D2 COMMSEC - Monitoring Native Execution in WoW64 Applications - Assaf Carlsbad & Yarden Shafir.pdf2018-08-30 23:29 2.1M 
[   ]D2 COMMSEC - Software Security Era - Past, Present and Future - Nafiez & Jaan Yeh.pdf2018-08-31 03:58 3.4M 
[   ]D2 COMMSEC - Using Machine Learning to Identify Security Issues in Open-Source Libraries - Asankhaya Sharma.pdf2018-08-31 03:22 1.2M 
[   ]D2 KEYNOTE - Machine Learning in Cybersecurity - Alexander Polyakov.pdf2018-08-30 22:13 17M 
[DIR]WHITEPAPERS/2018-09-03 20:07 -