![[ICO]](http://conference.hitb.org/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](http://conference.hitb.org/icons/back.gif) | Parent Directory | | - | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T1 - Barisani and Bianco - Practical Exploitation of Embedded Systems.pdf | 2014-06-19 23:45 | 1.8M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T1 - Chris Wysopal - Data Mining a Mountain of Vulnerabilities.pdf | 2014-06-19 23:45 | 3.0M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T1 - Lucas Adamski - Firefox OS and You.pdf | 2014-06-19 23:45 | 3.7M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T1 - Petko Petkov - History of the JavaScript Security Arsenal.pdf | 2014-06-19 23:45 | 4.6M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T1 - Philippe Langlois and Emmanuel Gadaix - 6000 Ways and More.pdf | 2014-06-19 23:45 | 18M | |
![[ ]](../../icons/unknown.gif) | D1T1 - The Pirate Bay - Data is Political - NO SHOW | 2014-06-19 23:45 | 0 | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - Don Bailey - Hackers, The Movie - A Retrospective.pdf | 2014-06-19 23:45 | 19M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - Haroon Meer - You and Your Research.pdf | 2014-06-19 23:45 | 38M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - Marc Heuse - IPv6 Insecurity Revolutions.pdf | 2014-06-19 23:45 | 1.8M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - Mark Dowd & Tarjei Mandt - iOS6 Security.pdf | 2014-06-19 23:45 | 769K | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - Meder Kydyraliev - Defibrilating Web Security.pdf | 2014-06-19 23:45 | 299K | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - Wes Brown - Supercomputing, Malware and Correlation.pdf | 2014-06-19 23:45 | 10M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T3 - Charlie Miller - Attacking NFC.pdf | 2014-06-19 23:45 | 7.0M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T3 - F Raynal & G Campana - An Attack Path to Jailbreaking Your Home Router.pdf | 2014-06-19 23:45 | 2.4M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T3 - John Draper - A Historical Look at the Personal Computer and Phreaking.pdf | 2014-06-19 23:45 | 5.0M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T3 - Jose Nazario - Tracking Large Scale Botnets.pdf | 2014-06-19 23:45 | 2.4M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T3 - Paul Sebastian Ziegler - Hacking in the Far East.pdf | 2014-06-19 23:45 | 18M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T3 - The Grugq - OPSEC - Because jail is for wuftpd.pdf | 2014-06-19 23:45 | 19M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T1 - Chris Evans - Element 1337 in the Periodic Table - Pwnium.pdf | 2014-06-19 23:45 | 5.1M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T1 - Katie Moussouris - How to Get Along with Vendors Without Really Trying.pdf | 2014-06-19 23:45 | 5.5M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T1 - Ollie Whitehouse - Finding the Weak Link in Binaries.pdf | 2014-06-19 23:45 | 738K | |
![[ ]](../../icons/unknown.gif) | D2T1 - Paul Vixie - Silo Busting in Information Security - NO SLIDES | 2014-06-19 23:45 | 0 | |
![[ ]](http://conference.hitb.org/icons/compressed.gif) | D2T1 - Rodrigo Branco - A Scientific Study of Malware Obfuscation Technologies.zip | 2014-06-19 23:45 | 1.2M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T1 - Shreeraj Shah - XSS and CSRF Strike Back Powered by HTML5.pdf | 2014-06-19 23:45 | 2.7M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T2 - Fyodor Yarochkin and Vladimir - Messing up the Kids Playground.pdf | 2014-06-19 23:45 | 8.0M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T2 - Jeremiah Grossman - Why Web Security is Fundamentally Broken.pdf | 2014-06-19 23:45 | 3.9M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T2 - Raoul Chiesa - Information Warfare and Cyberwar.pdf | 2014-06-19 23:45 | 3.7M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T2 - Saumil Shah - Innovative Approaches to Exploit Delivery.pdf | 2014-06-19 23:45 | 11M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T3 - Emmanuel Gadaix - Something MEGA.pdf | 2014-06-19 23:45 | 7.0M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T3 - Felix FX Lindner - Hacking Huawei VRP.pdf | 2014-06-19 23:45 | 3.8M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T3 - Mikko Hypponen - Behind Enemy Lines.pdf | 2014-06-19 23:45 | 6.1M | |
![[ ]](../../icons/unknown.gif) | D2T3 - OPENBOTTLE PANEL - NO SLIDES | 2014-06-19 23:45 | 0 | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T3 - Stefano Zanero - Behaviour-Based Methods for Automated Scalable Malware Analysis.pdf | 2014-06-19 23:45 | 1.5M | |
![[ ]](../../icons/unknown.gif) | D2T123 - IOS SECURITY PANEL - NO SLIDES | 2014-06-19 23:45 | 0 | |
|