Parent directory/ | - | - |
A Brief History of Mitigation - The Path to EL1 in iOS 11.en.transcribed.srt | 124.0 KiB | 2019 Sep 30 16:12 |
A Brief History of Mitigation - The Path to EL1 in iOS 11.mp4 | 34.0 MiB | 2021 Apr 03 02:06 |
A Deep Dive into macOS MDM (and How it can be Compromised).en.transcribed.srt | 130.2 KiB | 2019 Oct 01 07:27 |
A Deep Dive into macOS MDM (and How it can be Compromised).mp4 | 50.6 MiB | 2021 Apr 03 02:06 |
A Dive in to Hyper-V Architecture & Vulnerabilities.en.transcribed.srt | 129.2 KiB | 2019 Oct 01 07:27 |
A Dive in to Hyper-V Architecture & Vulnerabilities.mp4 | 46.9 MiB | 2021 Apr 03 02:06 |
AFL's Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries.en.transcribed.srt | 78.1 KiB | 2019 Oct 01 07:27 |
AFL's Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries.mp4 | 25.1 MiB | 2021 Apr 03 02:06 |
AI & ML in Cyber Security - Why Algorithms are Dangerous.en.transcribed.srt | 135.8 KiB | 2019 Oct 01 07:27 |
AI & ML in Cyber Security - Why Algorithms are Dangerous.mp4 | 52.3 MiB | 2021 Apr 03 02:06 |
ARTist - An Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware.en.transcribed.srt | 68.3 KiB | 2019 Oct 01 07:27 |
ARTist - An Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware.mp4 | 17.2 MiB | 2021 Apr 03 02:06 |
An Attacker Looks at Docker - Approaching Multi-Container Applications.en.transcribed.srt | 118.9 KiB | 2019 Sep 30 16:12 |
An Attacker Looks at Docker - Approaching Multi-Container Applications.mp4 | 32.8 MiB | 2021 Apr 03 02:06 |
An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities.en.transcribed.srt | 104.5 KiB | 2019 Oct 01 07:27 |
An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities.mp4 | 34.8 MiB | 2021 Apr 03 02:06 |
Another Flip in the Row.en.transcribed.srt | 133.9 KiB | 2019 Oct 01 07:27 |
Another Flip in the Row.mp4 | 35.6 MiB | 2021 Apr 03 02:06 |
Are You Trading Stocks Securely Exposing Security Flaws in Trading Technologies.en.transcribed.srt | 112.4 KiB | 2019 Oct 01 07:27 |
Are You Trading Stocks Securely Exposing Security Flaws in Trading Technologies.mp4 | 60.1 MiB | 2021 Apr 03 02:06 |
Attacking Client-Side JIT Compilers.en.transcribed.srt | 119.1 KiB | 2019 Oct 01 07:27 |
Attacking Client-Side JIT Compilers.mp4 | 46.9 MiB | 2021 Apr 03 02:06 |
Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme.en.transcribed.srt | 61.3 KiB | 2019 Oct 01 07:27 |
Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme.mp4 | 19.0 MiB | 2021 Apr 03 02:06 |
Automated Discovery of Deserialization Gadget Chains.en.transcribed.srt | 126.9 KiB | 2019 Oct 01 07:27 |
Automated Discovery of Deserialization Gadget Chains.mp4 | 32.7 MiB | 2021 Apr 03 02:06 |
Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities.mp4 | 55.5 MiB | 2021 Apr 03 02:06 |
Back to the Future - A Radical Insecure Design of KVM on ARM.en.transcribed.srt | 53.5 KiB | 2019 Sep 30 16:12 |
Back to the Future - A Radical Insecure Design of KVM on ARM.mp4 | 25.6 MiB | 2021 Apr 03 02:06 |
Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure.mp4 | 20.8 MiB | 2021 Apr 03 02:06 |
Behind the Speculative Curtain - The True Story of Fighting Meltdown and Spectre.en.transcribed.srt | 138.8 KiB | 2019 Sep 30 16:12 |
Behind the Speculative Curtain - The True Story of Fighting Meltdown and Spectre.mp4 | 74.9 MiB | 2021 Apr 03 02:06 |
Black Box is Dead. Long Live Black Box.en.transcribed.srt | 69.0 KiB | 2019 Sep 30 16:12 |
Black Box is Dead. Long Live Black Box.mp4 | 40.8 MiB | 2021 Apr 03 02:06 |
Black Hat USA 2018 Keynote - Parisa Tabriz.en.transcribed.srt | 151.0 KiB | 2019 Sep 30 16:12 |
Black Hat USA 2018 Keynote - Parisa Tabriz.mp4 | 94.3 MiB | 2021 Apr 03 02:06 |
Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths.en.transcribed.srt | 99.4 KiB | 2019 Oct 01 07:27 |
Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths.mp4 | 27.3 MiB | 2021 Apr 03 02:06 |
Breaking Parser Logic - Take Your Path Normalization off and Pop 0days Out.en.transcribed.srt | 91.1 KiB | 2019 Sep 30 16:13 |
Breaking Parser Logic - Take Your Path Normalization off and Pop 0days Out.mp4 | 28.2 MiB | 2021 Apr 03 02:06 |
Breaking the IIoT - Hacking industrial Control Gateways.en.transcribed.srt | 90.6 KiB | 2019 Sep 30 16:12 |
Breaking the IIoT - Hacking industrial Control Gateways.mp4 | 38.7 MiB | 2021 Apr 03 02:06 |
Catch me, Yes we can - Pwning Social Engineers.en.transcribed.srt | 158.9 KiB | 2019 Sep 30 16:12 |
Catch me, Yes we can - Pwning Social Engineers.mp4 | 52.6 MiB | 2021 Apr 03 02:06 |
Compression Oracle Attacks on VPN Networks.en.transcribed.srt | 106.2 KiB | 2019 Oct 01 07:27 |
Compression Oracle Attacks on VPN Networks.mp4 | 31.8 MiB | 2021 Apr 03 02:06 |
Day Zero - A Road Map to #BHUSA 2018.en.transcribed.srt | 270.6 KiB | 2019 Sep 30 16:12 |
Day Zero - A Road Map to #BHUSA 2018.mp4 | 119.2 MiB | 2021 Apr 03 02:06 |
Decompiler Internals - Microcode.en.transcribed.srt | 97.4 KiB | 2019 Sep 30 16:12 |
Decompiler Internals - Microcode.mp4 | 66.4 MiB | 2021 Apr 03 02:06 |
Deep Dive into an ICS Firewall, Looking for the Fire Hole.en.transcribed.srt | 106.7 KiB | 2019 Oct 01 07:27 |
Deep Dive into an ICS Firewall, Looking for the Fire Hole.mp4 | 32.8 MiB | 2021 Apr 03 02:06 |
Deep Neural Networks for Hackers - Methods, Applications, and Open Source Tools.en.transcribed.srt | 139.0 KiB | 2019 Sep 30 16:12 |
Deep Neural Networks for Hackers - Methods, Applications, and Open Source Tools.mp4 | 47.9 MiB | 2021 Apr 03 02:06 |
DeepLocker - Concealing Targeted Attacks with AI Locksmithing.en.transcribed.srt | 132.5 KiB | 2019 Oct 01 07:27 |
DeepLocker - Concealing Targeted Attacks with AI Locksmithing.mp4 | 54.6 MiB | 2021 Apr 03 02:06 |
Demystifying PTSD in the Cybersecurity Environment.en.transcribed.srt | 63.7 KiB | 2019 Oct 01 07:27 |
Demystifying PTSD in the Cybersecurity Environment.mp4 | 16.7 MiB | 2021 Apr 03 02:06 |
Detecting Credential Compromise in AWS.en.transcribed.srt | 72.6 KiB | 2019 Oct 01 07:27 |
Detecting Credential Compromise in AWS.mp4 | 22.2 MiB | 2021 Apr 03 02:06 |
Detecting Malicious Cloud Account Behavior - A Look at the New Native Platform Capabilities.en.transcribed.srt | 154.5 KiB | 2019 Sep 30 16:12 |
Detecting Malicious Cloud Account Behavior - A Look at the New Native Platform Capabilities.mp4 | 55.3 MiB | 2021 Apr 03 02:06 |
Dissecting Non-Malicious Artifacts - One IP at a Time.en.transcribed.srt | 49.7 KiB | 2019 Sep 30 16:12 |
Dissecting Non-Malicious Artifacts - One IP at a Time.mp4 | 23.1 MiB | 2021 Apr 03 02:06 |
Don't @ Me - Hunting Twitter Bots at Scale.en.transcribed.srt | 150.1 KiB | 2019 Sep 30 16:12 |
Don't @ Me - Hunting Twitter Bots at Scale.mp4 | 35.0 MiB | 2021 Apr 03 02:06 |
Edge Side Include Injection - Abusing Caching Servers into SSRF and Transparent Session Hijacking.en.transcribed.srt | 64.2 KiB | 2019 Sep 30 16:12 |
Edge Side Include Injection - Abusing Caching Servers into SSRF and Transparent Session Hijacking.mp4 | 22.2 MiB | 2021 Apr 03 02:06 |
Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.en.transcribed.srt | 117.0 KiB | 2019 Sep 30 16:12 |
Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.mp4 | 41.8 MiB | 2021 Apr 03 02:06 |
Every ROSE has its Thorn - The Dark Art of Remote Online Social Engineering.en.transcribed.srt | 137.4 KiB | 2019 Sep 30 16:12 |
Every ROSE has its Thorn - The Dark Art of Remote Online Social Engineering.mp4 | 38.4 MiB | 2021 Apr 03 02:06 |
Exploitation of a Modern Smartphone Baseband.en.transcribed.srt | 85.7 KiB | 2019 Oct 01 07:27 |
Exploitation of a Modern Smartphone Baseband.mp4 | 40.7 MiB | 2021 Apr 03 02:06 |
Finding Xori - Malware Analysis Triage with Automated Disassembly.en.transcribed.srt | 57.9 KiB | 2019 Sep 30 16:13 |
Finding Xori - Malware Analysis Triage with Automated Disassembly.mp4 | 21.7 MiB | 2021 Apr 03 02:06 |
Fire & Ice - Making and Breaking macOS Firewalls.en.transcribed.srt | 72.8 KiB | 2019 Sep 30 16:12 |
Fire & Ice - Making and Breaking macOS Firewalls.mp4 | 30.8 MiB | 2021 Apr 03 02:06 |
Follow the White Rabbit - Simplifying Fuzz Testing Using FuzzExMachina.en.transcribed.srt | 106.7 KiB | 2019 Sep 30 16:12 |
Follow the White Rabbit - Simplifying Fuzz Testing Using FuzzExMachina.mp4 | 58.5 MiB | 2021 Apr 03 02:06 |
For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.en.transcribed.srt | 106.5 KiB | 2019 Sep 30 16:13 |
For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.mp4 | 40.1 MiB | 2021 Apr 03 02:06 |
From Bot to Robot - How Abilities and Law Change with Physicality.en.transcribed.srt | 136.4 KiB | 2019 Sep 30 16:12 |
From Bot to Robot - How Abilities and Law Change with Physicality.mp4 | 39.7 MiB | 2021 Apr 03 02:06 |
From Workstation to Domain Admin - Why Secure Administration isn't Secure and How to Fix it.en.transcribed.srt | 142.8 KiB | 2019 Sep 30 16:13 |
From Workstation to Domain Admin - Why Secure Administration isn't Secure and How to Fix it.mp4 | 45.9 MiB | 2021 Apr 03 02:06 |
GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs.en.transcribed.srt | 165.1 KiB | 2019 Oct 01 07:27 |
GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs.mp4 | 40.5 MiB | 2021 Apr 03 02:06 |
Hardening Hyper-V through Offensive Security Research.en.transcribed.srt | 168.2 KiB | 2019 Oct 01 07:27 |
Hardening Hyper-V through Offensive Security Research.mp4 | 41.7 MiB | 2021 Apr 03 02:06 |
Holding on for Tonight - Addiction in InfoSec.en.transcribed.srt | 63.5 KiB | 2019 Sep 30 16:12 |
Holding on for Tonight - Addiction in InfoSec.mp4 | 24.3 MiB | 2021 Apr 03 02:06 |
How I Learned to Stop Worrying and Love the SBOM.en.transcribed.srt | 74.0 KiB | 2019 Oct 01 07:27 |
How I Learned to Stop Worrying and Love the SBOM.mp4 | 28.9 MiB | 2021 Apr 03 02:06 |
How TRITON Disrupted Safety Systems & Changed the Threat Landscape of Industrial Control Systems.en.transcribed.srt | 131.7 KiB | 2019 Oct 01 07:27 |
How TRITON Disrupted Safety Systems & Changed the Threat Landscape of Industrial Control Systems.mp4 | 53.9 MiB | 2021 Apr 03 02:06 |
How can Communities Move Forward After Incidents of Sexual Harassment or Assault.en.transcribed.srt | 81.2 KiB | 2019 Oct 01 07:27 |
How can Communities Move Forward After Incidents of Sexual Harassment or Assault.mp4 | 26.0 MiB | 2021 Apr 03 02:06 |
How can Someone with Autism Specifically Enhance the Cyber Security Workforce.en.transcribed.srt | 144.0 KiB | 2019 Oct 01 07:27 |
How can Someone with Autism Specifically Enhance the Cyber Security Workforce.mp4 | 75.6 MiB | 2021 Apr 03 02:06 |
I, for One, Welcome Our New Power Analysis Overlords.en.transcribed.srt | 73.0 KiB | 2019 Oct 01 07:27 |
I, for One, Welcome Our New Power Analysis Overlords.mp4 | 32.4 MiB | 2021 Apr 03 02:06 |
Identity Theft - Attacks on SSO Systems.en.transcribed.srt | 113.3 KiB | 2019 Sep 30 16:12 |
Identity Theft - Attacks on SSO Systems.mp4 | 36.3 MiB | 2021 Apr 03 02:06 |
InfoSec Philosophies for the Corrupt Economy.en.transcribed.srt | 66.4 KiB | 2019 Oct 01 07:27 |
InfoSec Philosophies for the Corrupt Economy.mp4 | 33.9 MiB | 2021 Apr 03 02:06 |
IoT Malware - Comprehensive Survey, Analysis Framework and Case Studies.en.transcribed.srt | 117.6 KiB | 2019 Sep 30 16:12 |
IoT Malware - Comprehensive Survey, Analysis Framework and Case Studies.mp4 | 53.4 MiB | 2021 Apr 03 02:06 |
Is the Mafia Taking Over Cybercrime.en.transcribed.srt | 87.2 KiB | 2019 Oct 01 07:27 |
Is the Mafia Taking Over Cybercrime.mp4 | 39.1 MiB | 2021 Apr 03 02:06 |
It's a PHP Unserialization Vulnerability Jim, but Not as We Know It.en.transcribed.srt | 110.7 KiB | 2019 Oct 01 07:27 |
It's a PHP Unserialization Vulnerability Jim, but Not as We Know It.mp4 | 51.8 MiB | 2021 Apr 03 02:06 |
KeenLab iOS Jailbreak Internals - Userland Read-Only Memory can be Dangerous.en.transcribed.srt | 101.0 KiB | 2019 Sep 30 16:13 |
KeenLab iOS Jailbreak Internals - Userland Read-Only Memory can be Dangerous.mp4 | 49.1 MiB | 2021 Apr 03 02:06 |
Kernel Mode Threats and Practical Defenses.en.transcribed.srt | 141.4 KiB | 2019 Oct 01 07:27 |
Kernel Mode Threats and Practical Defenses.mp4 | 36.6 MiB | 2021 Apr 03 02:06 |
Keynote - Optimistic Dissatisfaction with the Status Quo.en.transcribed.srt | 148.6 KiB | 2019 Sep 30 16:12 |
Keynote - Optimistic Dissatisfaction with the Status Quo.mp4 | 94.6 MiB | 2021 Apr 03 02:06 |
LTE Network Automation Under Threat.en.transcribed.srt | 123.8 KiB | 2019 Oct 01 07:27 |
LTE Network Automation Under Threat.mp4 | 39.2 MiB | 2021 Apr 03 02:06 |
Last Call for SATCOM Security.en.transcribed.srt | 85.4 KiB | 2019 Oct 01 07:27 |
Last Call for SATCOM Security.mp4 | 63.5 MiB | 2021 Apr 03 02:06 |
Legal Landmines - How Law and Policy are Rapidly Shaping Information Security.en.transcribed.srt | 144.2 KiB | 2019 Sep 30 16:12 |
Legal Landmines - How Law and Policy are Rapidly Shaping Information Security.mp4 | 78.8 MiB | 2021 Apr 03 02:06 |
Legal Liability for IOT Cybersecurity Vulnerabilities.en.transcribed.srt | 138.0 KiB | 2019 Oct 01 07:27 |
Legal Liability for IOT Cybersecurity Vulnerabilities.mp4 | 43.6 MiB | 2021 Apr 03 02:06 |
Lessons and Lulz - The 4th Annual Black Hat USA NOC Report.en.transcribed.srt | 98.3 KiB | 2019 Sep 30 16:13 |
Lessons and Lulz - The 4th Annual Black Hat USA NOC Report.mp4 | 50.0 MiB | 2021 Apr 03 02:06 |
Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines.en.transcribed.srt | 68.7 KiB | 2019 Oct 01 07:27 |
Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines.mp4 | 34.5 MiB | 2021 Apr 03 02:06 |
Lowering the Bar - Deep Learning for Side Channel Analysis.en.transcribed.srt | 120.5 KiB | 2019 Sep 30 16:12 |
Lowering the Bar - Deep Learning for Side Channel Analysis.mp4 | 43.8 MiB | 2021 Apr 03 02:06 |
Mainframe [zOS] Reverse Engineering and Exploit Development.en.transcribed.srt | 150.2 KiB | 2019 Sep 30 16:12 |
Mainframe [zOS] Reverse Engineering and Exploit Development.mp4 | 42.6 MiB | 2021 Apr 03 02:06 |
Measuring the Speed of the Red Queen's Race Adaption and Evasion in Malware.en.transcribed.srt | 83.3 KiB | 2019 Sep 30 16:12 |
Measuring the Speed of the Red Queen's Race Adaption and Evasion in Malware.mp4 | 24.2 MiB | 2021 Apr 03 02:06 |
Meltdown - Basics, Details, Consequences.en.transcribed.srt | 122.0 KiB | 2019 Sep 30 16:12 |
Meltdown - Basics, Details, Consequences.mp4 | 35.3 MiB | 2021 Apr 03 02:06 |
Mental Health Hacks - Fighting Burnout, Depression and Suicide in the Hacker Community.en.transcribed.srt | 132.7 KiB | 2019 Sep 30 16:13 |
Mental Health Hacks - Fighting Burnout, Depression and Suicide in the Hacker Community.mp4 | 73.9 MiB | 2021 Apr 03 02:06 |
Miasm - Reverse Engineering Framework.en.transcribed.srt | 113.7 KiB | 2019 Sep 30 16:12 |
Miasm - Reverse Engineering Framework.mp4 | 45.1 MiB | 2021 Apr 03 02:06 |
Money-rity Report - Using Intelligence to Predict the Next Payment Card Fraud Victims.en.transcribed.srt | 60.3 KiB | 2019 Sep 30 16:12 |
Money-rity Report - Using Intelligence to Predict the Next Payment Card Fraud Victims.mp4 | 32.8 MiB | 2021 Apr 03 02:06 |
New Norms and Policies in Cyber-Diplomacy.en.transcribed.srt | 167.0 KiB | 2019 Oct 01 07:27 |
New Norms and Policies in Cyber-Diplomacy.mp4 | 81.2 MiB | 2021 Apr 03 02:06 |
No Royal Road … Notes on Dangerous Game.en.transcribed.srt | 106.3 KiB | 2019 Oct 01 07:27 |
No Royal Road … Notes on Dangerous Game.mp4 | 41.6 MiB | 2021 Apr 03 02:06 |
None of My Pixel is Your Business - Active Watermarking Cancellation Against Video Streaming Service.en.transcribed.srt | 62.4 KiB | 2019 Sep 30 16:12 |
None of My Pixel is Your Business - Active Watermarking Cancellation Against Video Streaming Service.mp4 | 32.9 MiB | 2021 Apr 03 02:06 |
Outsmarting the Smart City.en.transcribed.srt | 92.6 KiB | 2019 Oct 01 07:27 |
Outsmarting the Smart City.mp4 | 57.3 MiB | 2021 Apr 03 02:06 |
Over-the-Air - How we Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars.en.transcribed.srt | 106.1 KiB | 2019 Sep 30 16:12 |
Over-the-Air - How we Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars.mp4 | 36.6 MiB | 2021 Apr 03 02:06 |
Pestilential Protocol - How Unsecure HL7 Messages Threaten Patient Lives.en.transcribed.srt | 133.8 KiB | 2019 Sep 30 16:12 |
Pestilential Protocol - How Unsecure HL7 Messages Threaten Patient Lives.mp4 | 69.9 MiB | 2021 Apr 03 02:06 |
Playback - A TLS 1.3 Story.en.transcribed.srt | 75.7 KiB | 2019 Sep 30 16:12 |
Playback - A TLS 1.3 Story.mp4 | 27.6 MiB | 2021 Apr 03 02:06 |
Practical Web Cache Poisoning - Redefining 'Unexploitable'.en.transcribed.srt | 113.6 KiB | 2019 Sep 30 16:12 |
Practical Web Cache Poisoning - Redefining 'Unexploitable'.mp4 | 33.9 MiB | 2021 Apr 03 02:06 |
Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks.en.transcribed.srt | 131.4 KiB | 2019 Oct 01 07:27 |
Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks.mp4 | 44.3 MiB | 2021 Apr 03 02:06 |
Pwnie Awards.en.transcribed.srt | 115.6 KiB | 2019 Oct 01 07:27 |
Pwnie Awards.mp4 | 83.6 MiB | 2021 Apr 03 02:06 |
Qualitative Look at Autonomous Peer Communication's Impact on Organizational Phishing Detection.en.transcribed.srt | 48.2 KiB | 2019 Oct 01 07:27 |
Qualitative Look at Autonomous Peer Communication's Impact on Organizational Phishing Detection.mp4 | 23.7 MiB | 2021 Apr 03 02:06 |
Real Eyes, Realize, Real Lies - Beating Deception Technologies.en.transcribed.srt | 50.3 KiB | 2019 Sep 30 16:12 |
Real Eyes, Realize, Real Lies - Beating Deception Technologies.mp4 | 19.2 MiB | 2021 Apr 03 02:06 |
Reconstruct the World from Vanished Shadow - Recovering Deleted VSS Snapshots.en.transcribed.srt | 63.2 KiB | 2019 Sep 30 16:13 |
Reconstruct the World from Vanished Shadow - Recovering Deleted VSS Snapshots.mp4 | 53.5 MiB | 2021 Apr 03 02:06 |
Remotely Attacking System Firmware.en.transcribed.srt | 116.8 KiB | 2019 Oct 01 07:27 |
Remotely Attacking System Firmware.mp4 | 48.9 MiB | 2021 Apr 03 02:06 |
Return of Bleichenbacher's Oracle Threat (ROBOT).en.transcribed.srt | 82.9 KiB | 2019 Oct 01 07:27 |
Return of Bleichenbacher's Oracle Threat (ROBOT).mp4 | 29.9 MiB | 2021 Apr 03 02:06 |
Reversing a Japanese Wireless SD Card - From Zero to Code Execution.mp4 | 40.7 MiB | 2021 Apr 03 02:06 |
SDL the Wont Break the Bank.en.transcribed.srt | 118.1 KiB | 2019 Oct 01 07:27 |
SDL the Wont Break the Bank.mp4 | 62.4 MiB | 2021 Apr 03 02:06 |
Screaming Channels - When Electromagnetic Side Channels Meet Radio Transceivers.en.transcribed.srt | 121.3 KiB | 2019 Sep 30 16:13 |
Screaming Channels - When Electromagnetic Side Channels Meet Radio Transceivers.mp4 | 40.7 MiB | 2021 Apr 03 02:06 |
SirenJack - Cracking a Secure Emergency Warning Siren System.en.transcribed.srt | 140.2 KiB | 2019 Sep 30 16:12 |
SirenJack - Cracking a Secure Emergency Warning Siren System.mp4 | 63.8 MiB | 2021 Apr 03 02:06 |
Snooping on Cellular Gateways and Their Critical Role in ICS.en.transcribed.srt | 135.9 KiB | 2019 Oct 01 07:27 |
Snooping on Cellular Gateways and Their Critical Role in ICS.mp4 | 57.7 MiB | 2021 Apr 03 02:06 |
So I became a Domain Controller.en.transcribed.srt | 104.3 KiB | 2019 Oct 01 07:27 |
So I became a Domain Controller.mp4 | 60.5 MiB | 2021 Apr 03 02:06 |
Squeezing a Key through a Carry Bit.en.transcribed.srt | 114.7 KiB | 2019 Oct 01 07:27 |
Squeezing a Key through a Carry Bit.mp4 | 36.5 MiB | 2021 Apr 03 02:06 |
Stealth Mango and the Prevalence of Mobile Surveillanceware.en.transcribed.srt | 147.3 KiB | 2019 Oct 01 07:27 |
Stealth Mango and the Prevalence of Mobile Surveillanceware.mp4 | 60.9 MiB | 2021 Apr 03 02:06 |
Stop that Release, There's a Vulnerability.en.transcribed.srt | 74.1 KiB | 2019 Sep 30 16:12 |
Stop that Release, There's a Vulnerability.mp4 | 32.7 MiB | 2021 Apr 03 02:06 |
Stress and Hacking - Understanding Cognitive Stress in Tactical Cyber Ops.en.transcribed.srt | 126.7 KiB | 2019 Sep 30 16:12 |
Stress and Hacking - Understanding Cognitive Stress in Tactical Cyber Ops.mp4 | 54.6 MiB | 2021 Apr 03 02:06 |
Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology.en.transcribed.srt | 122.8 KiB | 2019 Sep 30 16:12 |
Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology.mp4 | 46.3 MiB | 2021 Apr 03 02:06 |
TLBleed - When Protecting Your CPU Caches is Not Enough.en.transcribed.srt | 140.3 KiB | 2019 Sep 30 16:13 |
TLBleed - When Protecting Your CPU Caches is Not Enough.mp4 | 47.4 MiB | 2021 Apr 03 02:06 |
The Air-Gap Jumpers.en.transcribed.srt | 55.4 KiB | 2019 Oct 01 07:27 |
The Air-Gap Jumpers.mp4 | 30.9 MiB | 2021 Apr 03 02:06 |
The Finest Penetration Testing Framework for Software-Defined Networks.en.transcribed.srt | 112.6 KiB | 2019 Oct 01 07:27 |
The Finest Penetration Testing Framework for Software-Defined Networks.mp4 | 51.2 MiB | 2021 Apr 03 02:06 |
The Problems and Promise of WebAssembly.en.transcribed.srt | 61.8 KiB | 2019 Oct 01 07:27 |
The Problems and Promise of WebAssembly.mp4 | 13.1 MiB | 2021 Apr 03 02:06 |
The Science of Hiring and Retaining Female Cybersecurity Engineers.en.transcribed.srt | 163.0 KiB | 2019 Oct 01 07:27 |
The Science of Hiring and Retaining Female Cybersecurity Engineers.mp4 | 77.2 MiB | 2021 Apr 03 02:06 |
The Unbearable Lightness of BMC's.en.transcribed.srt | 140.9 KiB | 2019 Oct 01 07:27 |
The Unbearable Lightness of BMC's.mp4 | 55.3 MiB | 2021 Apr 03 02:06 |
There will be Glitches - Extracting and Analyzing Automotive Firmware Efficiently.en.transcribed.srt | 159.0 KiB | 2019 Sep 30 16:12 |
There will be Glitches - Extracting and Analyzing Automotive Firmware Efficiently.mp4 | 36.8 MiB | 2021 Apr 03 02:06 |
Threat Modeling in 2018 - Attacks, Impacts and Other Updates.en.transcribed.srt | 108.0 KiB | 2019 Sep 30 16:12 |
Threat Modeling in 2018 - Attacks, Impacts and Other Updates.mp4 | 42.3 MiB | 2021 Apr 03 02:06 |
Understanding and Exploiting Implanted Medical Devices.en.transcribed.srt | 165.7 KiB | 2019 Oct 01 07:27 |
Understanding and Exploiting Implanted Medical Devices.mp4 | 49.9 MiB | 2021 Apr 03 02:06 |
Unpacking the Packed Unpacker - Reverse Engineering an Android Anti-Analysis Native Library.en.transcribed.srt | 101.0 KiB | 2019 Sep 30 16:13 |
Unpacking the Packed Unpacker - Reverse Engineering an Android Anti-Analysis Native Library.mp4 | 44.6 MiB | 2021 Apr 03 02:06 |
WebAssembly - A New World of Native Exploits on the Browser.en.transcribed.srt | 132.6 KiB | 2019 Sep 30 16:12 |
WebAssembly - A New World of Native Exploits on the Browser.mp4 | 62.7 MiB | 2021 Apr 03 02:06 |
Why so Spurious Achieving Local Privilege Escalation on Operating Systems.en.transcribed.srt | 134.6 KiB | 2019 Oct 01 07:27 |
Why so Spurious Achieving Local Privilege Escalation on Operating Systems.mp4 | 60.1 MiB | 2021 Apr 03 02:06 |
Windows Notification Facility - Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet.en.transcribed.srt | 160.5 KiB | 2019 Sep 30 16:12 |
Windows Notification Facility - Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet.mp4 | 50.0 MiB | 2021 Apr 03 02:06 |
Windows Offender - Reverse Engineering Windows Defender's Antivirus Emulator.en.transcribed.srt | 156.8 KiB | 2019 Sep 30 16:12 |
Windows Offender - Reverse Engineering Windows Defender's Antivirus Emulator.mp4 | 75.6 MiB | 2021 Apr 03 02:06 |
WireGuard - Next Generation Secure Network Tunnel.en.transcribed.srt | 125.6 KiB | 2019 Sep 30 16:13 |
WireGuard - Next Generation Secure Network Tunnel.mp4 | 51.7 MiB | 2021 Apr 03 02:06 |
Your Voice is My Passport.en.transcribed.srt | 98.2 KiB | 2019 Oct 01 07:27 |
Your Voice is My Passport.mp4 | 55.7 MiB | 2021 Apr 03 02:06 |
ZEROing Trust - Do Zero Trust Approaches Deliver Real Security.en.transcribed.srt | 154.9 KiB | 2019 Sep 30 16:13 |
ZEROing Trust - Do Zero Trust Approaches Deliver Real Security.mp4 | 49.3 MiB | 2021 Apr 03 02:06 |