본문 바로가기

보안/Security Conference

HITBSecConf2017 – Amsterdam 발표자료

http://conference.hitb.org/hitbsecconf2017ams/materials/



[   ]CLOSING KEYNOTE - Natalie Silvanovich - The ECMA and The Chakra.pdf2017-04-15 16:22459K 
[   ]D1T1 - A New RISC - Don Bailey.pdf2017-04-13 14:4222M 
[   ]D1T1 - Ayoub Elaassal - Hacking Customer Information System.pdf2017-04-13 11:234.3M 
[   ]D1T1 - Michele Spagnuolo and Lukas Wilschelbaum - So We Broke All CSPS.pdf2017-04-13 12:251.6M 
[   ]D1T1 - Richard Johnson - Harnessing Intel Processor Trace on Windows for Vulnerability Discovery.pdf2017-04-13 18:073.8M 
[   ]D1T1 - Steven Seeley and Roberto Suggi Liverani - I Got 99 Trends and a # Is All Of Them.pdf2017-04-13 18:27154M 
[   ]D1T1 - Victor van der Veen - Drammer The Making Of.pdf2017-04-13 15:5126M 
[   ]D1T2 - JeongHoon Shin - Femotcell Hacking.pdf2017-04-13 16:034.4M 
[   ]D1T2 - Jos Wyers - A Guide to Key Impressioning Attacks.pdf2017-04-13 18:05120M 
[   ]D1T2 - Linan Hao and Long Liu - The Secret of ChakraCore.pdf2017-04-13 14:442.0M 
[   ]D1T2 - Najwa Aaraj - Side Channel Attacks Against iOS Crypto Libraries and More.pdf2017-04-13 18:341.6M 
[   ]D1T2 - Seunghun Han - Shadow-Box - The Practical and Omnipotent Sandbox.pdf2017-04-13 17:002.5M 
[   ]D1T2 - Slawomir Jasek - Cloning Any Android HCE Contactless Card.pdf2017-04-13 13:362.8M 
[   ]D1T3 - Clarence Chio and Anto Joseph - Practical Machine Learning in Infosecurity.pdf2017-04-13 14:332.3M 
[   ]D1T3 - Didier Stevens - Analyzing Malicious Office Documents.pdf2017-04-13 17:16833K 
[   ]D1T3 - Steve Lord - Unbridled HIDIOcy.pdf2017-04-13 17:251.6M 
[   ]D1T4 - Dominic Spill - Low Cost Open Source Spectrum Monitoring.pdf2017-04-13 18:0424M 
[   ]D1T4 - George Chatzisofroniou - Exploiting Windows Automatic Wireless Association Algorithm.pdf2017-04-13 16:381.0M 
[   ]D1T4 - Marc Newlin and Matt Knight - So You Want to Hack Radios.pdf2017-04-13 17:1510M 
[   ]D1T4 - Miika Turkia - Pwning Banks.pdf2017-04-13 14:34519K 
[   ]D1T4 - Niek Timmers and Albert Spruyt - Fault Injection Attacks On Secure Boot.pdf2017-04-13 18:382.6M 
[   ]D1T4 - Niels Warnars - Disarming EMET.pdf2017-04-13 11:10267K 
[   ]D1T4 - Patrick Wardle - Meet and Greet with the MacOS Malware Class of 2016.pdf2017-04-13 15:3617M 
[   ]D1T4 - Paulus Meesen and Don Mulders - A Passive Listing Ransomware Detector.pdf2017-04-13 12:20710K 
[   ]D1T4 - Vladamir Katalov - Breaking Apple’s iCloud Keychain.pdf2017-04-13 12:205.9M 
[   ]D2T1 - Ben Hayak - Advanced Same Origin Method Execution.pdf2017-04-14 11:2519M 
[   ]D2T1 - Bing Sun and Chong Xu - Bypassing Memory Mitigation Using Data-Only Exploitation Techniques.pdf2017-04-14 16:023.5M 
[   ]D2T1 - Markus Vervier - Hunting for Vulnerabilities in Signal.pdf2017-04-14 14:314.7M 
[   ]D2T1 - Patrick Wardle - Oversight - Exposing Spies on MacOS.pdf2017-04-14 16:1227M 
[   ]D2T1 - S. Huber, S. Artz and S. Rasthofer - Vulnerabilities in Android Password Managers.pdf2017-04-14 14:052.3M 
[   ]D2T1 - Trammel Hudson - Bootstrapping Systems with Open Source Firmware.pdf2017-04-14 17:2816M 
[   ]D2T2 - Anirudh Duggal - Hacking Medical Devices and Healthcare Infrastructure.pdf2017-04-14 17:243.8M 
[   ]D2T2 - Antonios Atlasis - An Attack-in-Depth Analysis of Multicast DNS and DNS Service Discovery.pdf2017-04-14 14:315.2M 
[   ]D2T2 - Yingtao Zeng, Qing Yang and Jun Li - Car Keyless Entry System Attacks.pdf2017-04-14 12:008.5M 
[   ]D2T2 - Yu Hong - Attack Surface Extended by URL Schemes.pdf2017-04-14 14:0512M 
[   ]D2T3 - James Forshaw - Introduction to Logical Privilege Escalation on Windows.pdf2017-04-14 14:093.1M 
[   ]D2T3 - Slawomir Jasek - Blue Picking - Hacking Bluetooth Smart Locks.pdf2017-04-18 21:596.8M 
[   ]D2T4 - Aseem Jakhar - IoT Hacking Simplified.pdf2017-04-14 16:0133M 
[   ]D2T4 - Chris van den Hooven - Will It Blend? CISOs and Hackers.pdf2017-04-14 14:38610K 
[   ]D2T4 - Don Bailey - Unauthorized Erlang.pdf2017-04-14 15:59822K 
[   ]D2T4 - Emmanuel Gadaix - A Surprise Encounter With a Telco APT.pdf2017-04-14 16:0475M 
[   ]D2T4 - Koh Yong Chuan - Understanding the Microsoft Ofice 2016 Protected View Sandbox.pdf2017-04-14 11:242.3M 
[   ]D2T4 - Maxim Goryachy and Mark Ermalov - Intel DCI Secrets.pdf2017-04-14 12:0420M 
[   ]D2T4 - Muhamad Abdul Wahab and Pascal Cortret - Pwning ARM Debug Components.pdf2017-04-14 11:072.3M 
[   ]D2T4 - Rob Fletcher - Bug Bounty from a Program’s Perspective.pdf2017-04-14 14:33637K 
[   ]D2T4 - Steven Wierckx - How to Make a Magic Mirror.pdf2017-04-14 17:213.2M 
[   ]KEYNOTE 1 - Saumil Shah - Redefining Defense.pdf2017-04-13 10:5119M 


'보안 > Security Conference' 카테고리의 다른 글

Blue Hat 2017 발표자료  (0) 2017.05.02
INFILTRATE 2017 발표자료  (0) 2017.04.23
NULLCON GOA'17 발표자료  (0) 2017.04.23
Black Hat Asia 2017 발표자료  (0) 2017.04.23
2017 BSides Ljubljana 발표영상 및 자료  (0) 2017.04.23