![[ICO]](http://conference.hitb.org/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](http://conference.hitb.org/icons/back.gif) | Parent Directory | | - | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1 KEYNOTE - Andy Ellis - Cognitive Injection.pdf | 2014-06-19 23:46 | 4.2M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T1 - Collin Mulliner - Android DDI - Dynamic Dalvik Instrumentation of Android Applications.pdf | 2014-06-19 23:46 | 854K | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T1 - Dominic Chell and Shaun Colley - Practical Attacks Against Encrypted VoIP Communications.pdf | 2014-06-19 23:46 | 4.9M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T1 - Gianni Gnesa - Hacking Corporations Using Unconventional Chained Exploits.pdf | 2014-06-19 23:46 | 54M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T1 - Kallenberg, Kovah, Butterworth - Defeating Signed BIOS Enforcement.pdf | 2014-06-19 23:46 | 1.3M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T1 - Marco Balduzzi, Kyle Wilhoit Alessandro Pasta - Attacking Vessel Tracking Systems for Fun and Profit.pdf | 2014-06-19 23:46 | 9.0M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T1 - Peter 'bl4sty' Geissler - Demystifying Game Console Security.pdf | 2014-06-19 23:46 | 20M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - Adam Laurie - RFIDler - Software Defined RFID Reader Writer Emulator.pdf | 2014-06-19 23:46 | 5.7M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - Andy Davis - Deriving Intelligence from USB Stack Interactions.pdf | 2014-06-19 23:46 | 1.4M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - Francisco - Owning a Cisco VoIP Environment.pdf | 2014-06-19 23:46 | 1.3M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - Joaquim Espinhara and Ulisses Alburquerque - Using Online Activity as Digital DNA.pdf | 2014-06-19 23:46 | 9.9M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - Mariano Graziano and Andrea Lanzi - How Actaeon Unveils Your Hypervisor.pdf | 2014-06-19 23:46 | 1.0M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - Mathias Morbitzer - TCP Idle Scans in IPv6.pdf | 2014-06-19 23:46 | 8.0M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T3 - Cem Gurkok - Hunting for OS X Rootkits in Memory.pdf | 2014-06-19 23:46 | 7.8M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T3 - Mike Shema - CSRF Lab.pdf | 2014-06-19 23:46 | 2.9M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T3 - Wes Brown - Malware Analysis Using Visualization.pdf | 2014-06-19 23:46 | 2.4M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T3 BONUS TALK - Marc Rogers - Why I Hacked TouchID and Still Think It's Awesome.pdf | 2014-06-19 23:46 | 9.9M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2 KEYNOTE - Joe Sullivan - Bringing Social to Security - NO SLIDES.pdf | 2014-06-19 23:46 | 0 | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T1 - Cyril 'pod2g' Cattiaux and GG - How Apple Can Read Your iMessages.pdf | 2014-06-19 23:46 | 7.6M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T1 - Hugo Teso - Digging Deeper Into Aviation Security.pdf | 2014-06-19 23:46 | 17M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T1 - James Forshaw - Exploiting XML Digital Signature Implementations.pdf | 2014-06-19 23:46 | 1.7M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T1 - Joshua 'p0sixninja' Hill - SHAttered Dreams.pdf | 2014-06-19 23:46 | 2.1M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T1 - Mark Vincent Yason - Diving Into IE10's Enhanced Protected Mode Sandbox.pdf | 2014-06-19 23:46 | 1.0M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T2 - Rahul Sasi - Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis.pdf | 2014-06-19 23:46 | 2.6M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T2 - Stefan Esser - Tales from iOS 6 Exploitation and iOS 7 Security Changes.pdf | 2014-06-19 23:46 | 2.9M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T2 - Stefano Zanero - Tracking and Characterizing Botnets Using Automatically Generated Domains.pdf | 2014-06-19 23:46 | 2.4M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T2 - Victor van der Veen - A Fast and Complete Android Method Tracer.pdf | 2014-06-19 23:46 | 1.6M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T2 - Vladimir Katalov - Cracking and Analyzing Apple's iCloud Protocol.pdf | 2014-06-19 23:46 | 7.8M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T3 - Ashar Javad - Trusted Friend Attack.pdf | 2014-06-19 23:46 | 15M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T3 - Eric Michaud and Ryan Lackey - Thwarting Evil Maid Attacks.pdf | 2014-06-19 23:46 | 6.9M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T3 - Job de Haas - 20 Ways Past Secure Boot.pdf | 2014-06-19 23:46 | 1.8M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T3 - Keith Lee and Jonathan Werrett - Facebook OSINT.pdf | 2014-06-19 23:46 | 5.2M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T3 - Luiz Eduardo and Joaquim Espinhara - Lost in Translation.pdf | 2014-06-19 23:46 | 16M | |
|