Index of /materials/sg2019

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]WHITEPAPER - 4G to 5G - New Attacks - Altaf Shaik.pdf2019-09-04 18:59 628K 
[   ]D2 KEYNOTE - Never Gonna Give You Up, Never Gonna Let You Down - Marc Rogers.pdf2019-08-29 22:32 8.9M 
[   ]D2 COMMSEC - Tracking Fake News Based On Deep Learning - T. Wei, Z. LV & D. Goodman.pdf2019-08-29 23:52 2.4M 
[   ]D2 COMMSEC - The Future Is Here - Modern Automotive Attack Surfaces - Lior Yaari & Yonatan Migdal.pdf2019-08-30 04:54 2.9M 
[   ]D2 COMMSEC - Physical To Cyber And Back - Fingerprint Scanner Security - Kevin Reed.pdf2019-08-30 04:52 3.3M 
[   ]D2 COMMSEC - PErfidious - Make PE Backdooring Great Again - Shreyans Doshi.pdf2019-08-29 23:52 472K 
[   ]D2 COMMSEC - DFEX – DNS File EXfiltration - Emilio Couto.pdf2019-08-30 00:42 4.2M 
[   ]D2 COMMSEC - Abusing Over-The-Air Client Provisioning - Slava Makkaveev & Artyom Skrobov.pdf2019-08-30 04:43 1.8M 
[   ]D2 - Recreating an iOS 0day Jailbreak Out of Apple’s Security Updates - Stefan Esser.pdf2019-08-30 05:35 2.9M 
[   ]D2 - Launching Feedback-Driven Fuzzing on TrustZone TEE - Andrey Akimov.pdf2019-08-31 20:31 2.4M 
[   ]D2 - Creating a Fuzzer for Diameter and LTE Telecom Protocols - Sergey Mashukov.pdf2019-08-30 00:29 5.6M 
[   ]D2 - Bypassing a Hardware-Based Trusted Boot Through x86 CPU Microcode Downgrade - Alexander Ermolov.pdf2019-08-29 23:37 8.3M 
[   ]D2 - 4G LTE Man in the Middle Attacks with a Hacked Femtocell - Xiaodong Zou.pdf2019-08-30 03:31 8.1M 
[   ]D1 KEYNOTE - The CISOs Dilemma - Saumil Shah.pdf2019-08-28 23:47 10M 
[   ]D1 COMMSEC - Zero to RCE in Two Days - Exploiting Zoom On macOS - Michael Gianarakis & Sean Yeoh.pdf2019-08-29 00:40 4.3M 
[   ]D1 COMMSEC - Tick Group - Activities Of The Tick Cyber Espionage Group In East Asia Over The Last 10 Years - Cha Minseok.pdf2019-08-29 00:40 4.3M 
[   ]D1 COMMSEC - Security Should Be Smarter, Not Harder - Katie Moussouris.pdf2019-08-29 04:53 5.0M 
[   ]D1 COMMSEC - How to Detect Fake Faces (Manipulated Images) Using CNNs - J. Xiong, T. Wei, H. Xin, W. Yang, D. Goodman.pdf2019-08-29 04:53 3.9M 
[   ]D1 COMMSEC - Hacking Object Detectors Is Just Like Training Neural Networks - J. Xiong, T. Wei, H. Xin, W. Yang, D. Goodman.pdf2019-08-29 03:19 4.7M 
[   ]D1 COMMSEC - Compendium Vulnus Subestimata - Underrated Security Bugs - Eldar Marcussen.pdf2019-08-29 02:41 646K 
[   ]D1 COMMSEC - Car Hacking Made Easel By Car Security Quarter (CSQ) - Alina Tan, Chun Yong, Tan Pei Si & Solomon Tan.pdf2019-08-29 02:41 2.6M 
[   ]D1 - Why You Should Fear Your Mundane Office Equipment - Mario Rivas & Daniel Romero.pdf2019-08-28 23:43 4.7M 
[   ]D1 - What Species of Fish Is This - Malware Classification with Graph Hash - Chia Ching Fang & Shih-Hao Weng.pdf2019-08-29 03:27 5.1M 
[   ]D1 - Understanding, Attacking & Securing Medical Devices - Ajay Pratap Singh.pdf2019-08-29 06:18 7.5M 
[   ]D1 - Static Code Analysis Recognition Evasion - Andreas Wiegenstein.pdf2019-08-28 23:43 2.7M 
[   ]D1 - Infiltrating Corporate Intranets Like The NSA - A Pre-Auth Remote Code Execution on Leading SSL VPNs - Orange Tsai & Tingyi Chan.pdf2019-08-29 07:21 4.6M 
[   ]D1 - Advanced Mutation Fuzzing Method For Wireless Protocols - Lidong Li & Xianzi Kong.pdf2019-08-29 03:23 43M 
[   ]D1 - 4G to 5G - New Attacks - Altaf Shaik.pdf2019-09-04 19:00 1.6M 
[   ]CLOSING KEYNOTE - Securing Cyber-Physical Systems - Moving Beyond Fear - Stefano Zanero.pdf2019-08-30 06:50 5.8M