Parent directory/ | - | - |
recon2014-01-eva-galperin-Keynote.mp4 | 78.7 MiB | 2019 Oct 01 03:54 |
recon2014-02-igor-skochinsky-Intel-Management-Engine-Secrets.mp4 | 180.2 MiB | 2019 Oct 01 03:54 |
recon2014-03-michael-ossmann-SDR-Tricks-with-HackRF.mp4 | 121.4 MiB | 2019 Oct 01 03:54 |
recon2014-04-exide-Glitching-For-n00bs.mp4 | 146.0 MiB | 2019 Oct 01 03:54 |
recon2014-05-jason-jones-jasiel-spelman-Reversing-on-the-Edge.mp4 | 100.6 MiB | 2019 Oct 01 03:54 |
recon2014-06-francisco-falcon-Breaking-Out-of-VirtualBox-through-3D-Acceleration.mp4 | 163.6 MiB | 2019 Oct 01 03:54 |
recon2014-07-marta-janus-Going-gets-tough-a-tale-of-encounters-with-novel-evasive-malware.mp4 | 59.5 MiB | 2019 Oct 01 03:54 |
recon2014-08-matt-oh-Reverse-Engineering-Flash-Memory-For-Fun-and-Benefit.mp4 | 166.4 MiB | 2019 Oct 01 03:54 |
recon2014-10-artem-dinaburg-andrew-ruef-Static-Translation-of-X86-Instruction-Semantics-to-LLVM-With-McSema.mp4 | 235.5 MiB | 2019 Oct 01 03:54 |
recon2014-11-nathan-keltner-charles-holmes-Here-be-Dragons-A-Bedtime-Tale-for-Sleepless-Nights.mp4 | 100.6 MiB | 2019 Oct 01 03:54 |
recon2014-12-assaf-nativ-The-Making-of-the-Kosher-Phone.mp4 | 147.9 MiB | 2019 Oct 01 03:54 |
recon2014-13-richard-johnson-Fuzzing-and-Patch-Analysis-SAGEly-Advice.mp4 | 268.2 MiB | 2019 Oct 01 03:54 |
recon2014-14-jason-jones-PIN-Point-Control-for-Analyzing-Malware.mp4 | 38.7 MiB | 2019 Oct 01 03:54 |
recon2014-15-alex-ionescu-Apple-SMC-The-place-to-be-definitely-For-an-implant.mp4 | 109.0 MiB | 2019 Oct 01 03:54 |
recon2014-16-endre-bangerter-dominic-fischer-Memory-Tracing-Forensic-Reverse-Engineering.mp4 | 134.2 MiB | 2019 Oct 01 03:54 |
recon2014-17-milan-bohacek-How-do-I-RE-object-oriented-code-and-you-should-too.mp4 | 173.1 MiB | 2019 Oct 01 03:54 |
recon2014-18-michael-coppola-Performing-Open-Heart-Surgery-on-a-Furby.mp4 | 232.5 MiB | 2019 Oct 01 03:54 |
recon2014-19-elad-shapira-Shall-we-play-a-game-Lessons-learned-while-playing-CoreWars8086.mp4 | 124.8 MiB | 2019 Oct 01 03:54 |
recon2014-20-andrzej-dereszowski-FunCap.mp4 | 106.9 MiB | 2019 Oct 01 03:54 |
recon2014-21-mougey-camille-francis-gabriel-DRM-obfuscation-versus-auxiliary-attacks.mp4 | 162.0 MiB | 2019 Oct 01 03:54 |
recon2014-22-wartortell-Rewriting-x86-Binaries-Many-PEs-Such-Secure-Wow.mp4 | 134.0 MiB | 2019 Oct 01 03:54 |
recon2014-23-brendan-dolan-gavitt-Dynamic-Analysis-Kung-Fu-with-PANDA.mp4 | 242.8 MiB | 2019 Oct 01 03:54 |
recon2014-24-colin-o-flynn-Power-Analysis-and-Clock-Glitching-with-the-Open-Source-ChipWhisperer-Platform.mp4 | 169.4 MiB | 2019 Oct 01 03:54 |
recon2014-25-william-peteroy-Exploit-tips-and-techniques.mp4 | 124.6 MiB | 2019 Oct 01 03:54 |
recon2014-26-jonas-zaddach-Exploring-the-impact-of-a-hard-drive-backdoor.mp4 | 185.0 MiB | 2019 Oct 01 03:54 |