![[ICO]](http://conference.hitb.org/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](http://conference.hitb.org/icons/back.gif) | Parent Directory | | - | |
![[ ]](http://conference.hitb.org/icons/compressed.gif) | D2T1 - Dumitri Codreanu - Abusing Microsofts Postmark Validation.zip | 2014-06-19 23:43 | 15M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T1 - Laurent Oudot - Web in the Middle.pdf | 2014-06-19 23:43 | 13M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - R Gassira and R Piccirillo - Hijacking Mobile Data Connections.pdf | 2014-06-19 23:43 | 9.6M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T1 - Tamas Rudnai - Fireshark .pdf | 2014-06-19 23:43 | 6.6M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T3 - Wes Brown - Advanced Malware Analysis Lab.pdf | 2014-06-19 23:43 | 6.1M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T2 - Job de Haas - SCA of Embedded Systems.pdf | 2014-06-19 23:43 | 5.9M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | KEYNOTE 2 - Mark Curphey - 10 Ideas That Might Change the Security industry.pdf | 2014-06-19 23:43 | 5.5M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T2 - Chris Hofmann - Firefox 4 and Opportunities for Security Research.pdf | 2014-06-19 23:43 | 4.6M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - Fyodor Yarochkin - From Russia with Love 2.pdf | 2014-06-19 23:43 | 3.5M | |
![[ ]](http://conference.hitb.org/icons/compressed.gif) | D2T1 - Michael Thumann - How to Rate the Security of Closed Source Software.zip | 2014-06-19 23:43 | 2.9M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T1 - Niels Teusink - Owned Live on Stage.pdf | 2014-06-19 23:43 | 2.1M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T1 - Roelof Temmingh - Maltego 3 - Start Your Engines.pdf | 2014-06-19 23:43 | 2.1M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T3 - Barry van Kampen - Arduino Lab.pdf | 2014-06-19 23:43 | 2.1M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T3 - BV Kampen - Arduino Lab.pdf | 2014-06-19 23:43 | 2.1M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - Jonathan Brossard - Breaking Virtualization by Switching to Virtual 8086 Mode.pdf | 2014-06-19 23:43 | 2.1M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T2 - Mariano Nunez Di Croce - SAProuter .pdf | 2014-06-19 23:43 | 1.7M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T1 - Alexander Polyakov - Attacking SAP Users with Sapsploit.pdf | 2014-06-19 23:43 | 1.3M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T2 - Devine & Aumaitre - Subverting Windows 7 x64 Kernel with DMA Attacks.pdf | 2014-06-19 23:43 | 1.3M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - Alexey Sintsov - JIT Spray Attacks and Advanced Shellcode.pdf | 2014-06-19 23:43 | 1.1M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T1 - John Kanen Flowers - Kanelbox.pdf | 2014-06-19 23:43 | 1.1M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T1 - Fyodor Yarochkin - XProbe NG.pdf | 2014-06-19 23:43 | 665K | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - Ilja van Sprundel - Having Fun with Apples IOKit.pdf | 2014-06-19 23:43 | 661K | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | KEYNOTE 1 - Anton Chuvakin - Security Chasm.pdf | 2014-06-19 23:43 | 651K | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T2 - Shreeraj Shah - Top 10 Web 2.0 Attacks.pdf | 2014-06-19 23:43 | 478K | |
|