Parent directory/ | - | - |
3d Red Pill - A Guest-to-Host Escape on QEMU KVM Virtio Device.eng.srt | 47.4 KiB | 2021 May 16 07:08 |
3d Red Pill - A Guest-to-Host Escape on QEMU KVM Virtio Device.mp4 | 43.9 MiB | 2021 May 17 21:50 |
Adversary Detection Pipelines Finally Making Your Threat Intel Useful.eng.srt | 65.0 KiB | 2021 May 16 07:08 |
Adversary Detection Pipelines Finally Making Your Threat Intel Useful.mp4 | 84.6 MiB | 2021 May 17 21:50 |
Attacking and Defending Machine Learning Applications of Public Cloud.eng.srt | 35.1 KiB | 2021 May 16 07:07 |
Attacking and Defending Machine Learning Applications of Public Cloud.mp4 | 30.2 MiB | 2021 May 17 21:50 |
Back to the Future. Cross-Protocol Attacks in the Era of 5G.eng.srt | 47.3 KiB | 2021 May 16 07:08 |
Back to the Future. Cross-Protocol Attacks in the Era of 5G.mp4 | 57.4 MiB | 2021 May 17 21:50 |
Biometrics & Privacy Time to Faceoff or is that FaceApp.eng.srt | 78.5 KiB | 2021 May 16 07:07 |
Biometrics & Privacy Time to Faceoff or is that FaceApp.mp4 | 72.9 MiB | 2021 May 17 21:50 |
BitLeaker Subverting BitLocker with One Vulnerability.eng.srt | 53.7 KiB | 2021 May 16 07:05 |
BitLeaker Subverting BitLocker with One Vulnerability.mp4 | 57.0 MiB | 2021 May 17 21:50 |
CDPwn Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days.eng.srt | 72.0 KiB | 2021 May 16 07:06 |
CDPwn Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days.mp4 | 60.9 MiB | 2021 May 17 21:50 |
Complexity Killed Security.eng.srt | 50.3 KiB | 2021 May 16 07:05 |
Complexity Killed Security.mp4 | 53.3 MiB | 2021 May 17 21:50 |
Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier.eng.srt | 35.6 KiB | 2021 May 16 07:10 |
Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier.mp4 | 36.1 MiB | 2021 May 17 21:50 |
Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation.eng.srt | 66.3 KiB | 2021 May 16 07:08 |
Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation.mp4 | 49.0 MiB | 2021 May 17 21:50 |
Engineering Cybersecurity for a Nation What Singapore is Learning from Cars and Sanitation.eng.srt | 77.8 KiB | 2021 May 16 07:05 |
Engineering Cybersecurity for a Nation What Singapore is Learning from Cars and Sanitation.mp4 | 130.0 MiB | 2021 May 17 21:50 |
Escaping Virtualized Containers.eng.srt | 87.6 KiB | 2021 May 16 07:05 |
Escaping Virtualized Containers.mp4 | 49.7 MiB | 2021 May 17 21:50 |
Faking a Factory Creating and Operating a Realistic Honeypot.eng.srt | 51.2 KiB | 2021 May 16 07:05 |
Faking a Factory Creating and Operating a Realistic Honeypot.mp4 | 45.6 MiB | 2021 May 17 21:50 |
First Contact - Vulnerabilities in Contactless Payments.eng.srt | 64.3 KiB | 2021 May 16 07:06 |
First Contact - Vulnerabilities in Contactless Payments.mp4 | 59.0 MiB | 2021 May 17 21:50 |
From an URGENT 11 Vulnerability to a Full Take-Down of a Factory, Using a Single Packet.eng.srt | 56.2 KiB | 2021 May 16 07:10 |
From an URGENT 11 Vulnerability to a Full Take-Down of a Factory, Using a Single Packet.mp4 | 49.9 MiB | 2021 May 17 21:50 |
Hey Google, Activate Spyware - When Google Assistant Uses a Vulnerability as a Feature.mp4 | 54.9 MiB | 2021 May 17 21:50 |
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale.eng.srt | 60.9 KiB | 2021 May 16 07:07 |
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale.mp4 | 48.0 MiB | 2021 May 17 21:50 |
Kr00k How KRACKing Amazon Echo Exposed a Billion Vulnerable Wi-Fi Devices.eng.srt | 60.0 KiB | 2021 May 16 07:07 |
Kr00k How KRACKing Amazon Echo Exposed a Billion Vulnerable Wi-Fi Devices.mp4 | 51.0 MiB | 2021 May 17 21:50 |
Locknote Conclusions and Key Takeaways from Day 1.eng.srt | 78.1 KiB | 2021 May 16 07:10 |
Locknote Conclusions and Key Takeaways from Day 1.mp4 | 88.6 MiB | 2021 May 17 21:50 |
Locknote Conclusions and Key Takeaways from Day 2.eng.srt | 68.5 KiB | 2021 May 16 07:11 |
Locknote Conclusions and Key Takeaways from Day 2.mp4 | 107.5 MiB | 2021 May 17 21:50 |
Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community.mp4 | 60.7 MiB | 2021 May 17 21:50 |
May the Trust be with You Empowering TrustZone-M with Multiple Trusted Environments.eng.srt | 51.6 KiB | 2021 May 16 07:08 |
May the Trust be with You Empowering TrustZone-M with Multiple Trusted Environments.mp4 | 39.5 MiB | 2021 May 17 21:50 |
Misuse of DNS, the Second Most Used Protocol.eng.srt | 47.3 KiB | 2021 May 16 07:05 |
Misuse of DNS, the Second Most Used Protocol.mp4 | 44.9 MiB | 2021 May 17 21:50 |
Page Cache Attacks Microarchitectural Attacks on Flawless Hardware.eng.srt | 63.6 KiB | 2021 May 16 07:08 |
Page Cache Attacks Microarchitectural Attacks on Flawless Hardware.mp4 | 62.1 MiB | 2021 May 17 21:50 |
Patching Loopholes Finding Backdoors in Applications.eng.srt | 34.5 KiB | 2021 May 16 07:05 |
Patching Loopholes Finding Backdoors in Applications.mp4 | 31.0 MiB | 2021 May 17 21:50 |
Raiden Glitching Framework.eng.srt | 57.2 KiB | 2021 May 16 07:05 |
Raiden Glitching Framework.mp4 | 56.0 MiB | 2021 May 17 21:50 |
Redback Advanced Static Binary Injection.eng.srt | 47.8 KiB | 2021 May 16 07:08 |
Redback Advanced Static Binary Injection.mp4 | 57.0 MiB | 2021 May 17 21:50 |
Securing the Next Version of HTTP How QUIC and HTTP 3 Compare to HTTP 2.eng.srt | 61.8 KiB | 2021 May 16 07:05 |
Securing the Next Version of HTTP How QUIC and HTTP 3 Compare to HTTP 2.mp4 | 40.7 MiB | 2021 May 17 21:50 |
Store-to-Leak Forwarding There and Back Again.eng.srt | 69.5 KiB | 2021 May 16 07:08 |
Store-to-Leak Forwarding There and Back Again.mp4 | 59.0 MiB | 2021 May 17 21:50 |
The Black Hat NOC Greatest Hits and Holy...Cows.eng.srt | 98.6 KiB | 2021 May 16 07:05 |
The Black Hat NOC Greatest Hits and Holy...Cows.mp4 | 69.8 MiB | 2021 May 17 21:50 |
The Evil Alt-Ego (ab)using HTTP Alternative Services.eng.srt | 57.7 KiB | 2021 May 16 07:05 |
The Evil Alt-Ego (ab)using HTTP Alternative Services.mp4 | 67.0 MiB | 2021 May 17 21:50 |
The Evil of Spy Camera.eng.srt | 41.4 KiB | 2021 May 16 07:06 |
The Evil of Spy Camera.mp4 | 53.3 MiB | 2021 May 17 21:50 |
The Inside Story There are Apps in Apps and Here is How to Break Them.eng.srt | 37.2 KiB | 2021 May 16 07:10 |
The Inside Story There are Apps in Apps and Here is How to Break Them.mp4 | 31.0 MiB | 2021 May 17 21:50 |
Tracking the Criminal of Fake News Based on a Unified Embedding.eng.srt | 35.3 KiB | 2021 May 16 07:10 |
Tracking the Criminal of Fake News Based on a Unified Embedding.mp4 | 32.7 MiB | 2021 May 17 21:50 |
WIFI-Important Remote Attack Surface Threat is Expanding.eng.srt | 41.8 KiB | 2021 May 16 07:07 |
WIFI-Important Remote Attack Surface Threat is Expanding.mp4 | 33.7 MiB | 2021 May 17 21:50 |
Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities.eng.srt | 67.3 KiB | 2021 May 16 07:05 |
Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities.mp4 | 52.2 MiB | 2021 May 17 21:50 |
What the Log So Many Events, so Little Time....eng.srt | 55.3 KiB | 2021 May 16 07:05 |
What the Log So Many Events, so Little Time....mp4 | 90.1 MiB | 2021 May 17 21:50 |
Wi-Fi Brokering.eng.srt | 64.8 KiB | 2021 May 16 07:08 |
Wi-Fi Brokering.mp4 | 53.7 MiB | 2021 May 17 21:50 |
Win the 0-Day Racing Game Against Botnet in Public Cloud.eng.srt | 31.3 KiB | 2021 May 16 07:11 |
Win the 0-Day Racing Game Against Botnet in Public Cloud.mp4 | 30.6 MiB | 2021 May 17 21:50 |
ZombieLoad Leaking Data on Intel CPUs.mp4 | 46.8 MiB | 2021 May 17 21:50 |