본문 바로가기

보안/Security Conference

HITBSecConf 2016 발표자료

https://conference.hitb.org/hitbsecconf2016ams/materials/


[   ]CLOSING KEYNOTE - Sophia D Antoine - Hardware Side Channels in Virtualized Environments.pdf2016-05-27 18:402.3M 
[   ]D1 COMMSEC - Elisabeth de Leeuw - Unformation in the Era of Hyper Connectivity.pdf2016-05-26 18:032.5M 
[   ]D1 COMMSEC - Marc Newlin - Applying Regulatory Data to IoT RF Reverse Engineering.pdf2016-05-26 15:595.7M 
[   ]D1 COMMSEC - Martin Knobloch - Don't Feed the Hippos.pdf2016-05-26 16:0018M 
[   ]D1 COMMSEC - Melanie Rieback - Pentesting ChatOps.pdf2016-05-30 10:063.4M 
[   ]D1 COMMSEC - Nadav Markus and Gal De Leon - Exploiting GLIBC - Hacking Everything.pdf2016-05-26 18:181.0M 
[   ]D1T1 - Jacob Torrey - Using the Observer Effect and Cyber Fengshui.pdf2016-05-26 15:374.9M 
[   ]D1T1 - Lin Huang - Forcing a Targeted LTE Cellphone into an Eavesdropping Network.pdf2016-05-26 18:001.7M 
[   ]D1T1 - Nick Biasini - Exploit Kits - Hunting the Hunters .pdf2016-05-26 17:0545M 
[   ]D1T1 - Radu Caragea - Peering into the Depths of TLS Traffic in Real Time.pdf2016-05-26 15:091.1M 
[   ]D1T1 - Shengping Wang and Xu Liu - Escape From The Docker-KVM-QEMU Machine.pdf2016-05-26 12:162.0M 
[   ]D1T1 - Tang Qing Hao - Virtualization System Vulnerability Discovery Framework.pdf2016-05-26 11:501.0M 
[   ]D1T2 - Broderick Aquilino and Wayne Low - Kernel Exploit Hunting and Mitigation.pdf2016-05-26 15:101.4M 
[   ]D1T2 - Chilik Tamir - Profiting from iOS Malware.pdf2016-05-26 15:3727M 
[   ]D1T2 - Michele Spagnuolo and Lukas Weichselbaum - CSP Oddities.pdf2016-05-26 12:311.6M 
[   ]D1T2 - Seunghun Han - Create Your Own Bad USB Device.pdf2016-05-26 17:003.5M 
[   ]D1T2 - Tim Xia - Adaptive Android Kernel Live Patching.pdf2016-05-26 18:202.4M 
[   ]D1T2 - Yann Allain and Julien Moinard - Hardsploit Project.pdf2016-05-26 11:508.5M 
[   ]D1T3 - Gustavo Grieco - Vulnerability Discovery Using Machine Learning.pdf2016-05-27 07:181.1M 
[   ]D1T3 LABS - Anto Joseph - Droid-FF.pdf2016-05-26 12:3130M 
[   ]D1T3 LABS - Tony Trummer and Tushar Dalvi - Mobile Application Security for iOS and Android.zip2016-05-26 18:294.9M 
[   ]D2 COMMSEC - Antonio Martins - Inspecage - Android Pacakge Inspector.zip2016-05-30 18:3019M 
[   ]D2 COMMSEC - Barry van Kampen - Hack in The Class.pdf2016-05-30 18:28520K 
[   ]D2 COMMSEC - Mattijs van Ommeren - A Series Of Unfortunate Events - Where Malware Meets Murphy.pdf2016-05-27 12:2471M 
[   ]D2 COMMSEC - Paul Marinescu - Facebook Presents Capture the Flag.pdf2016-05-30 10:176.3M 
[   ]D2 COMMSEC - Paul Moreno - Park This - Yet Another Parking Meter Talk.pdf2016-06-03 11:007.3M 
[   ]D2T1 - Anders Fogh - Cache Side Channel Attacks.pdf2016-05-27 13:52432K 
[   ]D2T1 - Felix Wilhelm - Attacking Next Generation Firewalls.pdf2016-05-27 15:592.9M 
[   ]D2T1 - Jun Li - CANSsee - An Automobile Intrusion Detection System.pdf2016-05-27 18:395.5M 
[   ]D2T1 - Yuwei Zheng and Haoqi Shan - Forging a Wireless Time Signal to Attack NTP Servers.pdf2016-05-27 12:266.9M 
[   ]D2T1 Itzik Kotler and Amit Klein - The Perfect Exfiltration Technique.pdf2016-05-27 15:072.6M 
[   ]D2T2 - Mikhail Egorov and Sergey Soldatov - New Methods for Exploiting ORM Injections in Java Applications.pdf2016-05-27 12:461.7M 
[   ]D2T2 - Peter blasty Geissler - Breaking Naive ESSID WPA2 Key Generation Algorithms.pdf2016-05-27 18:398.4M 
[   ]D2T2 - Richard Johnson - Go Speed Tracer - Guided Fuzzing.pdf2016-05-27 12:394.4M 
[   ]D2T2 - Shangcong Luan - Xen Hypervisor VM Escape.pdf2016-05-27 15:371.9M 
[   ]D2T2 - Wish Wu - Perf - From Profiling to Kernel Exploiting.pdf2016-05-27 15:06315K 
[   ]D2T3 - Matteo Beccaro - Electronic Access Control Security.pdf2016-07-06 12:3913M 
[   ]D2T3 LABS - Matteo Beccaro - Electronic Access Control Security.pdf2016-05-27 16:1113M 
[   ]KEYNOTE 1 - John Adams - Beyond FBI v Apple.pdf2016-05-26 09:406.4M 
[   ]KEYNOTE 2 - Adam Laurie - The Future Has Arrived and it's Effin Hilarious.odp2016-05-27 10:47281M 
[DIR]Whitepapers/2016-06-30 02:14-