index-of.es


Imagen


Icon  Name                                                                                               Last modified      Size  Description
[DIR] Parent Directory                                                                                                        -   
[   ] 00-Branko.pdf                                                                                      08-Jun-2017 18:49  372K  
[   ] 01-Brown.pdf                                                                                       08-Jun-2017 18:49   24M  
[   ] 02-Geshev.pdf                                                                                      08-Jun-2017 18:49  1.2M  
[   ] 03-Kaluzny.pdf                                                                                     08-Jun-2017 18:49   22M  
[   ] 04-Novikov.pdf                                                                                     08-Jun-2017 18:49  8.0M  
[   ] 05-Nosenko.pdf                                                                                     08-Jun-2017 18:49  8.6M  
[   ] 06-Zisis-Naziridis.pdf                                                                             08-Jun-2017 18:49  5.3M  
[   ] 07-Belov.pdf                                                                                       08-Jun-2017 18:49  9.0M  
[   ] 08-Daniel-Azure.pdf                                                                                08-Jun-2017 18:49  1.9M  
[   ] 09_Schlej.pdf                                                                                      08-Jun-2017 18:49  2.8M  
[   ] 10-Matrosov.pdf                                                                                    08-Jun-2017 18:49  1.9M  
[   ] 11-Tarakanov.pdf                                                                                   08-Jun-2017 18:49  729K  
[   ] 12-Krotofil.pdf                                                                                    08-Jun-2017 18:49   14M  
[   ] 13-Ermolov.pdf                                                                                     08-Jun-2017 18:49  1.5M  
[   ] 14-shekyan.pdf                                                                                     08-Jun-2017 18:49  5.0M  
[   ] 15-Gregorio.pdf                                                                                    08-Jun-2017 18:49   14M  
[   ] 16-Brown.pdf                                                                                       08-Jun-2017 18:49   14M  
[   ] 17-Yunusov.pdf                                                                                     08-Jun-2017 18:49  4.4M  
[   ] 18-kochkov.pdf                                                                                     08-Jun-2017 18:49  372K  
[   ] 19-Plastunov.pdf                                                                                   08-Jun-2017 18:50   31M  
[   ] 20-Litvinov.pdf                                                                                    08-Jun-2017 18:50   20M  
[   ] 21-Beccaro-Collura .pdf                                                                            08-Jun-2017 18:50  5.9M  
[   ] 23-Ravnas.pdf                                                                                      08-Jun-2017 18:50  2.7M  
[   ] 25-Klendar.pdf                                                                                     08-Jun-2017 18:50  3.3M  
[   ] 27-Kovalev.pdf                                                                                     08-Jun-2017 18:50  679K  
[   ] 28-Levin.pdf                                                                                       08-Jun-2017 18:50  6.5M  
[   ] 29-Zaitov.pdf                                                                                      08-Jun-2017 18:50  2.9M  
[   ] 30-Shabalin.pdf                                                                                    08-Jun-2017 18:50  2.1M  
[   ] 31-Ermakov.pdf                                                                                     08-Jun-2017 18:50  6.2M  
[   ] 32-Firstov.pdf                                                                                     08-Jun-2017 18:50  2.8M  
[   ] 33-Matrosov-Rodionov.pdf                                                                           08-Jun-2017 18:50  1.8M  
[   ] 34-Kolegov.pdf                                                                                     08-Jun-2017 18:50  1.2M  
[   ] 35-Egorov.pdf                                                                                      08-Jun-2017 18:50  1.0M  
[   ] 36-Egorov-Soldatov.pdf                                                                             08-Jun-2017 18:50  1.9M  
[   ] 37-Ignatov.pdf                                                                                     08-Jun-2017 18:50  609K  
[   ] 40-ValdikSS.pdf                                                                                    08-Jun-2017 18:50  1.1M  
[   ] 41-ructfe.pdf                                                                                      08-Jun-2017 18:50  4.7M  
[   ] 42-Elkin-Bulatenko.pdf                                                                             08-Jun-2017 18:50  1.4M  
[   ] 43-bolshev-ryutin.pdf                                                                              08-Jun-2017 18:50  4.0M  
[   ] ASOTO.pdf                                                                                          08-Jun-2017 18:50  2.2M  
[   ] AlexeyTyurin-OraclePeopleSoftapplicationsareunderattacks.pdf                                       08-Jun-2017 18:50  4.6M  
[   ] CLOSING KEYNOTE - Sophia D Antoine - Hardware Side Channels in Virtualized Environments.pdf        08-Jun-2017 18:50  2.3M  
[   ] CyrillBrunschwiler.pdf                                                                             08-Jun-2017 18:50  2.6M  
[   ] D1 COMMSEC - Elisabeth de Leeuw - Unformation  in the Era of Hyper Connectivity.pdf                08-Jun-2017 18:50  2.5M  
[   ] D1 COMMSEC - Marc Newlin - Applying Regulatory Data to IoT RF Reverse Engineering.pdf              08-Jun-2017 18:50  5.7M  
[   ] D1 COMMSEC - Martin Knobloch - Don't Feed the Hippos.pdf                                           08-Jun-2017 18:50   18M  
[   ] D1 COMMSEC - Melanie Rieback - Pentesting ChatOps.pdf                                              08-Jun-2017 18:50  3.4M  
[   ] D1 COMMSEC - Nadav Markus and Gal De Leon - Exploiting GLIBC - Hacking Everything.pdf              08-Jun-2017 18:50  1.0M  
[   ] D1T1 - Jacob Torrey - Using the Observer Effect and Cyber Fengshui.pdf                             08-Jun-2017 18:50  4.9M  
[   ] D1T1 - Lin Huang - Forcing a Targeted LTE Cellphone into an Eavesdropping Network.pdf              08-Jun-2017 18:50  1.7M  
[   ] D1T1 - Nick Biasini - Exploit Kits - Hunting the Hunters .pdf                                      08-Jun-2017 18:50   45M  
[   ] D1T1 - Radu Caragea - Peering into the Depths of TLS Traffic in Real Time.pdf                      08-Jun-2017 18:50  1.1M  
[   ] D1T1 - Shengping Wang and Xu Liu - Escape From The Docker-KVM-QEMU Machine.pdf                     08-Jun-2017 18:50  2.0M  
[   ] D1T1 - Tang Qing Hao - Virtualization System Vulnerability Discovery Framework.pdf                 08-Jun-2017 18:50  1.0M  
[   ] D1T2 - Broderick Aquilino and Wayne Low - Kernel Exploit Hunting and Mitigation.pdf                08-Jun-2017 18:50  1.4M  
[   ] D1T2 - Chilik Tamir - Profiting from iOS Malware.pdf                                               08-Jun-2017 18:50   27M  
[   ] D1T2 - Michele Spagnuolo and Lukas Weichselbaum - CSP Oddities.pdf                                 08-Jun-2017 18:50  1.6M  
[   ] D1T2 - Seunghun Han - Create Your Own Bad USB Device.pdf                                           08-Jun-2017 18:50  3.5M  
[   ] D1T2 - Tim Xia - Adaptive Android Kernel Live Patching.pdf                                         08-Jun-2017 18:50  2.4M  
[   ] D1T2 - Yann Allain and Julien Moinard - Hardsploit Project.pdf                                     08-Jun-2017 18:51  8.5M  
[   ] D1T3 - Gustavo Grieco - Vulnerability Discovery Using Machine Learning.pdf                         08-Jun-2017 18:50  1.1M  
[   ] D1T3 LABS - Anto Joseph - Droid-FF.pdf                                                             08-Jun-2017 18:51   30M  
[   ] D2 COMMSEC - Barry van Kampen - Hack in The Class.pdf                                              08-Jun-2017 18:51  520K  
[   ] D2 COMMSEC - Mattijs van Ommeren - A Series Of Unfortunate Events - Where Malware Meets Murphy.pdf 08-Jun-2017 18:51   71M  
[   ] D2 COMMSEC - Paul Marinescu - Facebook Presents Capture the Flag.pdf                               08-Jun-2017 18:51  6.3M  
[   ] D2T1 - Anders Fogh - Cache Side Channel Attacks.pdf                                                08-Jun-2017 18:51  432K  
[   ] D2T1 - Felix Wilhelm - Attacking Next Generation Firewalls.pdf                                     08-Jun-2017 18:51  2.9M  
[   ] D2T1 - Jun Li - CANSsee - An Automobile Intrusion Detection System.pdf                             08-Jun-2017 18:51  5.5M  
[   ] D2T1 - Yuwei Zheng and Haoqi Shan - Forging a Wireless Time Signal to Attack NTP Servers.pdf       08-Jun-2017 18:51  6.9M  
[   ] D2T1 Itzik Kotler and Amit Klein - The Perfect Exfiltration Technique.pdf                          08-Jun-2017 18:51  2.6M  
[   ] D2T2 - Peter blasty Geissler - Breaking Naive ESSID WPA2 Key Generation Algorithms.pdf             08-Jun-2017 18:51  8.4M  
[   ] D2T2 - Richard Johnson - Go Speed Tracer - Guided Fuzzing.pdf                                      08-Jun-2017 18:51  4.4M  
[   ] D2T2 - Shangcong Luan - Xen Hypervisor VM Escape.pdf                                               08-Jun-2017 18:51  1.9M  
[   ] D2T2 - Wish Wu - Perf - From Profiling to Kernel Exploiting.pdf                                    08-Jun-2017 18:51  315K  
[   ] D2T3 LABS - Matteo Beccaro - Electronic Access Control Security.pdf                                08-Jun-2017 18:51   13M  
[   ] DBI Frameworks Applied to Computer Security - Uses and Comparative.pdf                             08-Jun-2017 18:51  2.7M  
[   ] DeralHeilandandPeterArzamendi.pdf                                                                  08-Jun-2017 18:51  5.9M  
[   ] FrancisAlexander.pdf                                                                               08-Jun-2017 18:51   10M  
[   ] HiP2k13-Burp_Pro_Tips_and_Tricks.pdf                                                               08-Jun-2017 18:51  2.7M  
[   ] JohnButterworth.pdf                                                                                08-Jun-2017 18:51  6.9M  
[   ] JosepPiandPedro.pdf                                                                                08-Jun-2017 18:51  4.0M  
[   ] KEYNOTE 1 - John Adams - Beyond FBI v Apple.pdf                                                    08-Jun-2017 18:51  6.4M  
[   ] KrzysztofKotowicz.pdf                                                                              08-Jun-2017 18:51  1.3M  
[   ] Malware vs Virtualization - The endless cat and mouse play.pdf                                     08-Jun-2017 18:51   12M  
[   ] MarioHeiderich.pdf                                                                                 08-Jun-2017 18:51  1.8M  
[   ] Next Generation Rootkits for ARM Based Devices.pdf                                                 08-Jun-2017 18:51  5.7M  
[   ] Origin Policy Enforcement in Modern Browsers.pdf                                                   08-Jun-2017 18:51  1.2M  
[   ] Remoting Android Applications for Fun and Profit.pdf                                               08-Jun-2017 18:51  731K  
[   ] SebastienAndrivet.pdf                                                                              08-Jun-2017 18:51   13M  
[   ] SolomonSonya.pdf                                                                                   08-Jun-2017 18:51  3.8M  
[   ] The Inner HTML Apocalypse - How MXSS Attacks Change Everything We Believed to Know so Far.pdf      08-Jun-2017 18:51  2.0M  
[   ] ThomasLeiWang.pdf                                                                                  08-Jun-2017 18:51  3.0M  
[   ] Web Applications Forensics.pdf                                                                     08-Jun-2017 18:51  1.3M  
[   ] Windows-Phone-8-application-security-slides.pdf                                                    08-Jun-2017 18:51  970K  
[   ] WinnSchwartau.pdf                                                                                  08-Jun-2017 18:52   23M  
[   ] WoW64-Bypassing-EMET.pdf                                                                           08-Jun-2017 18:52  388K  
[   ] arsal_ertunga_sap.pdf                                                                              08-Jun-2017 18:50  4.4M  
[   ] axelle_aprville_hackinparis.pdf                                                                    08-Jun-2017 18:50  6.8M  
[   ] deral_heiland_simple_network_management_pwnd.pdf                                                   08-Jun-2017 18:51  1.8M  
[   ] lopes_esteves_kasmi_you_dont_hear_me.pdf                                                           08-Jun-2017 18:51  1.2M  
[   ] matias_katz_backdooring_x11.pdf                                                                    08-Jun-2017 18:51  153K  
[   ] moshe_sioni_ddos_mitigation_epic_fail_collection.pdf                                               08-Jun-2017 18:51  704K  
[   ] nicolas_gregoire_server_side_browsing.pdf                                                          08-Jun-2017 18:51  1.7M  
[   ] revisitingatmvulnerabilitiesforourfunandvendors.pdf                                                08-Jun-2017 18:51  1.9M  
[   ] timur_yusinov_root_via_sms.pdf                                                                     08-Jun-2017 18:51  3.6M  
[   ] veit_hailperin_still_exploiting_tcp_timestamps.pdf                                                 08-Jun-2017 18:51  1.5M  
[   ] windows_artifact_analysis.pdf                                                                      08-Jun-2017 18:52  3.0M  
[   ] winn_schwartau_analogue_network_security.pdf                                                       08-Jun-2017 18:52  6.1M  


© 2013-2017 - index-of.es


email feed