Index of /files/hitbsecconf2018dxb/materials

[ICO] Name Last modified Size Description

[PARENTDIR] Parent Directory   -  
[   ] CLOSING KEYNOTE - Blind Digital Signatures - Dr Manar Abu Talib and Dr Qassim Nasir.pdf 2018-11-28 10:33 5.8M  
[   ] D1 BSIDES - Blockchain - The New Line of Defense - Ramy AlDamati.pdf 2018-11-27 23:59 5.8M  
[   ] D1 BSIDES - Creating Custom Browser Extensions to Hunt Low Hanging Fruits - Rewanth Cool.pdf 2018-11-27 22:56 928K  
[   ] D1 BSIDES - Cyber Security of the Future - Dr Bushra AlBelooshi.pdf 2018-11-27 23:22 5.5M  
[   ] D1 COMMSEC - Building Security Beyond The Genesis Block - Ryan Shepherd.pdf 2018-11-27 23:04 5.4M  
[   ] D1 COMMSEC - Building Your Own Self Driving, Self Racing Car - Dhillon Kannabhiran.pdf 2018-11-27 23:28 3.1M  
[   ] D1 COMMSEC - Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding - Vikash Yadav.pdf 2018-11-27 23:43 5.4M  
[   ] D1 COMMSEC - Hacking Yachts Remotely - IoT Hacking at Sea - Stephan Gerling.pdf 2018-11-27 22:59 3.0M  
[   ] D1 COMMSEC - Hacking into Broadband and Broadcast TV Systems - Chaouki Kasmi, Thomas Sabono and Pierre Barre.pdf 2018-11-27 23:06 1.6M  
[   ] D1 COMMSEC - Hacking the 0day Market - Andrea Zapparoli Manzoni.pdf 2018-11-27 22:50 4.3M  
[   ] D1 COMMSEC - System-level Threats - Dangerous Assumptions in Modern Product Security - Cristofaro Mune.pdf 2018-11-28 04:20 1.8M  
[   ] D1 COMMSEC - Taking Over Telecom Networks - Loay Hassan Abdelrazak and Hardik Mehta.pdf 2018-12-02 16:12 4.4M  
[   ] D1 KEYNOTE - Crouching Tiger Sudden Keynote - Katie Moussouris.pdf 2018-11-27 22:48 4.1M  
[   ] D1T1 - AI Model Security - Reverse Engineering Machine Learning Models - Kang Li.pdf 2018-11-27 23:10 14M  
[   ] D1T1 - Hunting for Backdoors in IoT Firmware at Unprecedented Scale - John Toterhi.pdf 2018-11-27 23:08 4.0M  
[   ] D1T1 - Infecting Files On The Fly - Leonardo Nve.pdf 2018-11-27 22:54 7.3M  
[   ] D1T1 - Rooting Routers Using Symbolic Execution - Mathy Vanhoef.pdf 2018-11-27 23:33 1.7M  
[   ] D1T1 - The Phantom Menace- Intel ME Manufacturing Mode - Maxim Goryachy and Mark Ermolov.pdf 2018-11-27 23:22 22M  
[   ] D1T1 - Virtualizing IoT With Code Coverage Guided Fuzzing - Lau Kai Jern and Nguyen Anh Quynh.pdf 2018-11-27 22:52 8.6M  
[   ] D1T2 - A Multidimensional Hardware Attack and Defense Tool Set - Kunzhe Chai, Jie Fu and Mingchuang Qin.pdf 2018-11-27 23:53 6.3M  
[   ] D1T2 - Cloudy With a Chance of Messages - Extracting Messages from iCloud - Vladimir Katalov.pdf 2018-11-27 23:25 13M  
[   ] D1T2 - Gold Digging - Discovering Hidden Gems in APKs - Marc Schoenefeld.pdf 2018-11-27 23:40 8.7M  
[   ] D1T2 - Hacking Telephone Systems for Fun and Profit - Himanshu Mehta and Sachin Wagh.pdf 2018-11-27 23:18 28M  
[   ] D1T2 - IPv666 – Address of the Beast - Marc Newlin and Chris Grayson.pdf 2018-11-27 23:40 2.3M  
[   ] D1T2 - IoT Woodpecker - Intrusion-Detection On The Hardware Bus - Congyuan Xu.pdf 2018-11-27 23:36 7.7M  
[   ] D2 BSIDES - Growth Hacking Your Community - Dr Marwan Al-Zarouni.pdf 2018-11-28 05:23 9.2M  
[   ] D2 BSIDES - Hunting Threats in Your Enterprise - Abdulrahman Alnimari.pdf 2018-11-28 05:25 21M  
[   ] D2 BSIDES - My Experience of Running CTF Competitions in 7 Arab Countries - Moataz Salah.pdf 2018-11-28 04:05 3.5M  
[   ] D2 BSIDES - Women in Cybersecurity - Heide Young.pdf 2018-11-28 04:04 13M  
[   ] D2 COMMSEC - A Secured and Robust Wireless Communication System for Low-Latency Applications - Dr Husameldin Mukhtar.pdf 2018-11-28 07:03 21M  
[   ] D2 COMMSEC - Evolution of Security Threats to Telecommunications Infrastructures - Emmanuel Gadaix.pdf 2018-11-28 05:28 27M  
[   ] D2 COMMSEC - HWallet - The Simple Cryptocurrency Hardware Wallet - Nemanja Nikodijevic.pdf 2018-11-28 07:02 576K  
[   ] D2 COMMSEC - Hacking the International RFQ Process - Dino Covotsos.pdf 2018-11-28 10:17 4.1M  
[   ] D2 COMMSEC - Improved Blockchain Infrastructure with IoT - Dr Manar Abu Talib and Dr Qassim Nasir.pdf 2018-11-28 10:26 19M  
[   ] D2 COMMSEC - Offensive Memory Forensics - Hugo Teso.pdf 2018-11-28 06:10 30M  
[   ] D2 KEYNOTE - Cyber Arms Race - Mikko Hypponen.pdf 2018-11-28 07:22 3.9M  
[   ] D2T1 - DHCP is Hard - Felix Wilhelm.pdf 2018-11-28 03:43 422K  
[   ] D2T1 - GLitch Chronicles - Turning WebGL Into A Hammer - Pietro Frigo.pdf 2018-11-28 07:05 27M  
[   ] D2T1 - Horror On The Bus - Hacking COMBUS - Kirils Solovjovs.pdf 2018-11-28 03:43 6.7M  
[   ] D2T1 - It WISN’t Me - Attacking Industrial Wireless Mesh Networks - Mattijs van Ommeren and Erwin Patternote.pdf 2018-11-28 06:19 1.8M  
[   ] D2T1 - Vote of No Confidence - Second Factor Correctness - Victor Mateu.pdf 2018-11-28 10:48 2.6M  
[   ] D2T2 - Are You Listening? Auditable & Provable Privacy of Smart Speakers - Wang Kang and Yang Bo.pdf 2018-11-28 03:56 12M  
[   ] D2T2 - Back On The Chain Gang - Blockchain, Public Chain and Contract Security - Li Jiafeng and Yang Changcheng.pdf 2018-11-28 03:51 18M  
[   ] D2T2 - Capture This - Real Time Packet Processing with FPGAs - Matteo Collura.pdf 2018-11-28 06:25 5.2M  
[   ] D2T2 - NTLM Relay Is Dead Long Live NTLM Relay - Jianing Wang and Junyu Zhou.pdf 2018-11-28 07:09 26M  
[   ] D2T2 - Using Machine-Learning to Investigate Web Campaigns at Large - Federico Maggi.pdf 2018-11-28 10:17 10M