Parent directory/ | - | - |
(In)Security of Medical Devices by Florian Grunow.mp4 | 102.3 MiB | 2021 Mar 21 03:33 |
(In)Security of Medical Devices by Florian Grunow.srt | 74.3 KiB | 2019 Oct 01 06:33 |
A new exploitation method to bypass stack canaries by Yuki Koike.mp4 | 44.3 MiB | 2021 Mar 21 03:33 |
Abusing Adobe Reader's JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.srt | 41.1 KiB | 2019 Oct 01 06:33 |
Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.mp4 | 68.3 MiB | 2021 Mar 21 03:33 |
An Abusive Relationship with AngularJS by Mario Heiderich.mp4 | 133.8 MiB | 2021 Mar 21 03:33 |
An Abusive Relationship with AngularJS by Mario Heiderich.srt | 54.5 KiB | 2019 Oct 01 06:33 |
Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik.mp4 | 106.4 MiB | 2021 Mar 21 03:33 |
Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik.srt | 39.0 KiB | 2019 Oct 01 06:33 |
Defeating Firefox by Muneaki Nishimura.mp4 | 74.4 MiB | 2021 Mar 21 03:33 |
Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio.mp4 | 98.2 MiB | 2021 Mar 21 03:33 |
Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio.srt | 50.4 KiB | 2019 Oct 01 06:33 |
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim.mp4 | 114.8 MiB | 2021 Mar 21 03:33 |
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim.srt | 35.3 KiB | 2019 Oct 01 06:33 |
Is there an EFI monster inside your apple by Pedro Vilaca.mp4 | 121.6 MiB | 2021 Mar 21 03:33 |
Is there an EFI monster inside your apple by Pedro Vilccca.srt | 85.8 KiB | 2019 Oct 01 06:33 |
Keynote The Singularity is Near by Takuya Matsuda.mp4 | 84.9 MiB | 2021 Mar 21 03:33 |
Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.mp4 | 97.9 MiB | 2021 Mar 21 03:33 |
Making and Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.srt | 76.1 KiB | 2019 Oct 01 06:33 |
New immune system of information security from CHINA by Xiaodun Fang.mp4 | 92.5 MiB | 2021 Mar 21 03:33 |
Ninja Correlation of APT Binaries by Bhavna Soman.mp4 | 62.9 MiB | 2021 Mar 21 03:33 |
Ninja Correlation of APT Binaries by Bhavna Soman.srt | 39.4 KiB | 2019 Oct 01 06:33 |
PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.mp4 | 46.4 MiB | 2021 Mar 21 03:33 |
Practical network defense at scale by Travis Carelock.mp4 | 133.9 MiB | 2021 Mar 21 03:33 |
Practical network defense at scale by Travis Carelock.srt | 72.7 KiB | 2019 Oct 01 06:33 |
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.mp4 | 109.3 MiB | 2021 Mar 21 03:33 |
The Only Way to Tell the Truth is in Fiction by Richard Thieme.mp4 | 145.3 MiB | 2021 Mar 21 03:33 |
Wireless security testing with attack by Keiichi Horiai.mp4 | 114.0 MiB | 2021 Mar 21 03:33 |
[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.mp4 | 31.0 MiB | 2021 Mar 21 03:33 |
[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.mp4 | 55.1 MiB | 2021 Mar 21 03:33 |
[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.mp4 | 27.4 MiB | 2021 Mar 21 03:33 |