List of Material
CLOSING-KEYNOTE-Securing-Cyber-Physical-Systems-Moving-Beyond-Fear-Stefano-Zanero.pdf
D1-Static-Code-Analysis-Recognition-Evasion-Andreas-Wiegenstein.pdf
D1-4G-to-5G-New-Attacks-Altaf-Shaik.pdf
D1-COMMSEC-Compendium-Vulnus-Subestimata-Underrated-Security-Bugs-Eldar-Marcussen.pdf
D1-COMMSEC-Hacking-Object-Detectors-Is-Just-Like-Training-Neural-Networks-J.-Xiong--T.-Wei--H.-Xin--W.-Yang--D.-Goodman.pdf
D1-COMMSEC-How-to-Detect-Fake-Faces-Manipulated-Images-Using-CNNs-J.-Xiong--T.-Wei--H.-Xin--W.-Yang--D.-Goodman.pdf
D1-COMMSEC-Security-Should-Be-Smarter-Not-Harder-Katie-Moussouris.pdf
D1-COMMSEC-Tick-Group-Activities-Of-The-Tick-Cyber-Espionage-Group-In-East-Asia-Over-The-Last-10-Years-Cha-Minseok.pdf
D1-KEYNOTE-The-CISOs-Dilemma-Saumil-Shah.pdf
D2-Bypassing-a-Hardware-Based-Trusted-Boot-Through-x86-CPU-Microcode-Downgrade-Alexander-Ermolov.pdf
D2-Creating-a-Fuzzer-for-Diameter-and-LTE-Telecom-Protocols-Sergey-Mashukov.pdf
D2-Launching-Feedback-Driven-Fuzzing-on-TrustZone-TEE-Andrey-Akimov.pdf
D2-Recreating-an-iOS-0day-Jailbreak-Out-of-Apple-Security-Updates-Stefan-Esser.pdf
D2-4G-LTE-Man-in-the-Middle-Attacks-with-a-Hacked-Femtocell-Xiaodong-Zou.pdf
D2-COMMSEC-DFEX-DNS-File-EXfiltration-Emilio-Couto.pdf
D2-COMMSEC-PErfidious-Make-PE-Backdooring-Great-Again-Shreyans-Doshi.pdf
D2-COMMSEC-Physical-To-Cyber-And-Back-Fingerprint-Scanner-Security-Kevin-Reed.pdf
D2-KEYNOTE-Never-Gonna-Give-You-Up-Never-Gonna-Let-You-Down-Marc-Rogers.pdf
WHITEPAPER-4G-to-5G-New-Attacks-Altaf-Shaik.pdf