Index of /CONF SLIDES AND PAPER

[ICO]NameLast modifiedSizeDescription

[DIR]Parent Directory  -  
[   ]SSTIC2012-Miasm Framework de reverse engineering-slides.pdf13-Jun-2016 03:34 589K 
[   ]SSTIC2014-BTA outil open-source d.analyse AD.pdf13-Jun-2016 18:05 637K 
[   ]SSTIC2016-Article-how_to_not_break_lte_crypto-michau_devine.pdf27-Sep-2016 23:10 907K 
[   ]asia-16-Bashan-Enterprise-Apps-Bypassing-The-iOS-Gatekeeper-wp.pdf14-Oct-2016 22:12 285K 
[   ]asia-16-Bashan-Enterprise-Apps-Bypassing-The-iOS-Gatekeeper.pdf14-Oct-2016 22:12 3.9M 
[   ]asia-16-Costin-Automated-Dynamic-Firmware-Analysis-At-Scale-A-Case-Study-On-Embedded-Web-Interfaces-wp.pdf14-Oct-2016 22:11 509K 
[   ]asia-16-He-Hey-Your-Parcel-Looks-Bad-Fuzzing-And-Exploiting-Parcelization-Vulnerabilities-In-Android-wp.pdf14-Oct-2016 22:14 5.4M 
[   ]asia-16-He-Hey-Your-Parcel-Looks-Bad-Fuzzing-And-Exploiting-Parcelization-Vulnerabilities-In-Android.pdf14-Oct-2016 22:14 2.1M 
[   ]asia-16-Kazanciyan-DSCompromised-A-Windows-DSC-Attack-Framework.pdf14-Oct-2016 22:12 3.9M 
[   ]asia-16-Marco-Gisbert-Exploiting-Linux-And-PaX-ASLRS-Weaknesses-On-32-And-64-Bit-Systems-wp.pdf14-Oct-2016 22:14 2.8M 
[   ]asia-16-Marco-Gisbert-Exploiting-Linux-And-PaX-ASLRS-Weaknesses-On-32-And-64-Bit-Systems.pdf14-Oct-2016 22:13 2.1M 
[   ]asia-16-Ossmann-Rapid-Radio-Reversing.pdf14-Oct-2016 22:17 2.1M 
[   ]asia-16-Rubin-The-Perl-Jam-2-The-Camel-Strikes-Back.pdf14-Oct-2016 22:20 2.3M 
[   ]asia-16-Saad-Android-Commercial-Spyware-Disease-And-Medication-wp.pdf14-Oct-2016 22:11 1.3M 
[   ]asia-16-Zillner-Lets-See-Whats-Out-There-Mapping-The-Wireless-IOT.pdf14-Oct-2016 22:16 26M 
[   ]eu-14-Hafif-Reflected-File-Download-a-New-Web-Attack-Vector-wp.pdf11-Aug-2016 01:16 1.6M 
[   ]eu-14-Selvi-Bypassing-HTTP-Strict-Transport-Security-wp.pdf25-Sep-2016 16:16 285K 
[   ]eu-15-Bai-Authenticator-Leakage-Through-Backup-Channels-On-Android.pdf14-Oct-2016 21:57 8.4M 
[   ]eu-15-Balduzzi-Cybercrmine-In-The-Deep-Web-wp.pdf14-Oct-2016 21:58 3.2M 
[   ]eu-15-Balduzzi-Cybercrmine-In-The-Deep-Web.pdf14-Oct-2016 21:58 8.1M 
[   ]eu-15-Barresi-Silently-Breaking-ASLR-In-The-Cloud-wp.pdf14-Oct-2016 22:07 3.3M 
[   ]eu-15-Barresi-Silently-Breaking-ASLR-In-The-Cloud.pdf14-Oct-2016 22:07 5.0M 
[   ]eu-15-Benameur-All-Your-Root-Checks-Are-Belong-To-Us-The-Sad-State-Of-Root-Detection.pdf14-Oct-2016 21:56 544K 
[   ]eu-15-Bettini-Vulnerability-Exploitation-In-Docker-Container-Environments-wp.pdf14-Oct-2016 22:09 3.7M 
[   ]eu-15-Bettini-Vulnerability-Exploitation-In-Docker-Container-Environments.pdf14-Oct-2016 22:10 20M 
[   ]eu-15-Blanda-Fuzzing-Android-A-Recipe-For-Uncovering-Vulnerabilities-Inside-System-Components-In-Android-wp.pdf14-Oct-2016 01:51 870K 
[   ]eu-15-Borgaonkar-LTE-And-IMSI-Catcher-Myths-wp.pdf14-Oct-2016 22:05 2.6M 
[   ]eu-15-Borgaonkar-LTE-And-IMSI-Catcher-Myths.pdf14-Oct-2016 22:05 4.1M 
[   ]eu-15-Jarmoc-Going-AUTH-The-Rails-On-A-Crazy-Train-wp.pdf14-Oct-2016 22:00 2.2M 
[   ]eu-15-Jarmoc-Going-AUTH-The-Rails-On-A-Crazy-Train.pdf14-Oct-2016 22:01 6.9M 
[   ]eu-15-Kim-Triaging-Crashes-With-Backward-Taint-Analysis-For-ARM-Architecture.pdf14-Oct-2016 22:09 2.1M 
[   ]eu-15-Lin-Androbugs-Framework-An-Android-Application-Security-Vulnerability-Scanner.pdf14-Oct-2016 21:56 5.3M 
[   ]eu-15-Mayer-Faux-Disk-Encryption-Realities-Of-Secure-Storage-On-Mobile-Devices-wp.pdf14-Oct-2016 21:59 2.4M 
[   ]eu-15-Mayer-Faux-Disk-Encryption-Realities-Of-Secure-Storage-On-Mobile-Devices.pdf14-Oct-2016 22:01 61M 
[   ]eu-15-Mittal-Continuous-Intrusion-Why-CI-Tools-Are-An-Attackers-Best-Friend.pdf14-Oct-2016 21:57 6.2M 
[   ]eu-15-Polyakov-Cybersecurity-For-Oil-And-Gas-Industries-How-Hackers-Can-Manipulate-Oil-Stocks-wp.pdf14-Oct-2016 21:58 1.7M 
[   ]eu-15-Polyakov-Cybersecurity-For-Oil-And-Gas-Industries-How-Hackers-Can-Manipulate-Oil-Stocks.pdf14-Oct-2016 21:58 16M 
[   ]eu-15-Shah-Stegosploit-Exploit-Delivery-With-Steganography-And-Polyglots.pdf14-Oct-2016 22:09 39M 
[   ]eu-15-Somorovsky-How-To-Break-XML-Encryption-Automatically-wp.pdf14-Oct-2016 22:03 286K 
[   ]eu-15-Somorovsky-How-To-Break-XML-Encryption-Automatically.pdf14-Oct-2016 22:03 2.9M 
[   ]eu-15-Stasinopoulos-Commix-Detecting-And-Exploiting-Command-Injection-Flaws-wp.pdf14-Oct-2016 21:57 322K 
[   ]eu-15-Stasinopoulos-Commix-Detecting-And-Exploiting-Command-Injection-Flaws.pdf14-Oct-2016 21:57 2.9M 
[   ]eu-15-Todesco-Attacking-The-XNU-Kernal-In-El-Capitain.pdf14-Oct-2016 21:56 1.8M 
[   ]eu-15-Vigo-Even-The-Lastpass-Will-Be-Stolen-deal-with-it.pdf14-Oct-2016 21:59 6.7M 
[   ]us-15-Arnaboldi-Abusing-XSLT-For-Practical-Attacks-wp.pdf14-Oct-2016 22:21 2.0M 
[   ]us-15-Arnaboldi-Abusing-XSLT-For-Practical-Attacks.pdf14-Oct-2016 22:21 14M 
[   ]us-15-Bobrov-Certifi-Gate-Front-Door-Access-To-Pwning-Millions-Of-Androids-wp.pdf14-Oct-2016 22:30 581K 
[   ]us-15-Bobrov-Certifi-Gate-Front-Door-Access-To-Pwning-Millions-Of-Androids.pdf14-Oct-2016 22:30 5.0M 
[   ]us-15-Brossard-SMBv2-Sharing-More-Than-Just-Your-Files-wp.pdf14-Oct-2016 22:56 1.4M 
[   ]us-15-Brossard-SMBv2-Sharing-More-Than-Just-Your-Files.pdf14-Oct-2016 22:56 3.7M 
[   ]us-15-Cassidy-Switches-Get-Stitches.pdf14-Oct-2016 22:59 4.1M 
[   ]us-15-Conti-Pen-Testing-A-City-wp.pdf14-Oct-2016 22:46 542K 
[   ]us-15-Conti-Pen-Testing-A-City.pdf14-Oct-2016 22:48 43M 
[   ]us-15-Cui-Emanate-Like-A-Boss-Generalized-Covert-Data-Exfiltration-With-Funtenna.pdf14-Oct-2016 22:37 26M 
[   ]us-15-Dalman-Commercial-Spyware-Detecting-The-Undetectable-wp.pdf14-Oct-2016 22:30 1.3M 
[   ]us-15-Dalman-Commercial-Spyware-Detecting-The-Undetectable.pdf14-Oct-2016 22:32 2.0M 
[   ]us-15-Domas-The-Memory-Sinkhole-Unleashing-An-x86-Design-Flaw-Allowing-Universal-Privilege-Escalation-wp.pdf14-Oct-2016 23:01 209K 
[   ]us-15-Domas-The-Memory-Sinkhole-Unleashing-An-x86-Design-Flaw-Allowing-Universal-Privilege-Escalation.pdf14-Oct-2016 23:01 16M 
[   ]us-15-Domas-TheMemorySinkhole.pdf08-Aug-2015 13:51 28K 
[   ]us-15-Drake-Stagefright-Scary-Code-In-The-Heart-Of-Android.pdf14-Oct-2016 19:10 1.3M 
[   ]us-15-Fillmore-Crash-Pay-How-To-Own-And-Clone-Contactless-Payment-Devices-wp.pdf14-Oct-2016 22:32 302K 
[   ]us-15-Fillmore-Crash-Pay-How-To-Own-And-Clone-Contactless-Payment-Devices.pdf14-Oct-2016 22:32 1.7M 
[   ]us-15-Gaddam-Securing-Your-Big-Data-Environment.pdf14-Oct-2016 22:56 1.1M 
[   ]us-15-Gavrichenkov-Breaking-HTTPS-With-BGP-Hijacking-wp.pdf14-Oct-2016 22:26 133K 
[   ]us-15-Gavrichenkov-Breaking-HTTPS-With-BGP-Hijacking.pdf14-Oct-2016 22:26 281K 
[   ]us-15-Gong-Fuzzing-Android-System-Services-By-Binder-Call-To-Escalate-Privilege-wp.pdf14-Oct-2016 22:40 717K 
[   ]us-15-Gong-Fuzzing-Android-System-Services-By-Binder-Call-To-Escalate-Privilege.pdf14-Oct-2016 22:40 1.2M 
[   ]us-15-Graeber-Abusing-Windows-Management-Instrumentation-WMI-To-Build-A-Persistent Asynchronous-And-Fileless-Backdoor-wp.pdf14-Oct-2016 22:21 1.0M 
[   ]us-15-Kettle-Server-Side-Template-Injection-RCE-For-The-Modern-Web-App-wp.pdf14-Oct-2016 22:57 1.7M 
[   ]us-15-Kirda-Most-Ransomware-Isn’t-As-Complex-As-You-Might-Think-wp.pdf14-Oct-2016 22:45 793K 
[   ]us-15-Kirda-Most-Ransomware-Isn’t-As-Complex-As-You-Might-Think.pdf14-Oct-2016 22:45 5.8M 
[   ]us-15-Klick-Internet-Facing-PLCs-A-New-Back-Orifice-wp.pdf14-Oct-2016 22:44 879K 
[   ]us-15-Kozy-Bringing-A-Cannon-To-A-Knife-Fight.pdf14-Oct-2016 22:29 14M 
[   ]us-15-Krotofil-Rocking-The-Pocket-Book-Hacking-Chemical-Plant-For-Competition-And-Extortion-wp.pdf14-Oct-2016 22:53 9.9M 
[   ]us-15-Krotofil-Rocking-The-Pocket-Book-Hacking-Chemical-Plant-For-Competition-And-Extortion.pdf14-Oct-2016 22:53 10M 
[   ]us-15-Kruegel-Using-Static-Binary-Analysis-To-Find-Vulnerabilities-And-Backdoors-In-Firmware.pdf14-Oct-2016 23:04 28M 
[   ]us-15-Larsen-Remote-Physical-Damage-101-Bread-And-Butter-Attacks.pdf14-Oct-2016 22:48 16M 
[   ]us-15-Lei-Optimized-Fuzzing-IOKit-In-iOS-wp.pdf14-Oct-2016 22:45 634K 
[   ]us-15-Lei-Optimized-Fuzzing-IOKit-In-iOS.pdf14-Oct-2016 22:47 2.1M 
[   ]us-15-MarquisBoire-Big-Game-Hunting-The-Peculiarities-Of-Nation-State-Malware-Research.pdf14-Oct-2016 22:25 584K 
[   ]us-15-Metcalf-Red-Vs-Blue-Modern-Active-Directory-Attacks-Detection-And-Protection-wp.pdf14-Oct-2016 22:47 1.4M 
[   ]us-15-Metcalf-Red-Vs-Blue-Modern-Active-Directory-Attacks-Detection-And-Protection.pdf14-Oct-2016 22:47 2.7M 
[   ]us-15-Moore-Defeating Pass-the-Hash-Separation-Of-Powers-wp.pdf14-Oct-2016 22:35 705K 
[   ]us-15-Moore-Spread-Spectrum-Satcom-Hacking-Attacking-The-GlobalStar-Simplex-Data-Service-wp.pdf14-Oct-2016 22:56 203K 
[   ]us-15-Moore-Spread-Spectrum-Satcom-Hacking-Attacking-The-GlobalStar-Simplex-Data-Service.pdf14-Oct-2016 22:56 4.3M 
[   ]us-15-Morris-CrackLord-Maximizing-Password-Cracking-wp.pdf14-Oct-2016 22:32 272K 
[   ]us-15-Morris-CrackLord-Maximizing-Password-Cracking.pdf14-Oct-2016 22:32 2.0M 
[   ]us-15-Nafeez-Dom-Flow-Untangling-The-DOM-For-More-Easy-Juicy-Bugs.pdf14-Oct-2016 22:36 908K 
[   ]us-15-Nguyen-Unicorn-Next-Generation-CPU-Emulator-Framework.pdf14-Oct-2016 23:03 750K 
[   ]us-15-Ossmann-The-NSA-Playset-A-Year-Of-Toys-And-Tools.pdf14-Oct-2016 23:01 1.8M 
[   ]us-15-Park-This-Is-DeepERENT-Tracking-App-Behaviors-With-Nothing-Changed-Phone-For-EvasiveAAndroid-Malware.pdf14-Oct-2016 23:02 1.7M 
[   ]us-15-Peterson-GameOver-Zeus-Badguys-And-Backends-wp.pdf14-Oct-2016 22:41 1.2M 
[   ]us-15-Peterson-GameOver-Zeus-Badguys-And-Backends.pdf14-Oct-2016 22:41 7.9M 
[   ]us-15-Pickett-Staying-Persistent-In-Software-Defined-Networks-wp.pdf14-Oct-2016 22:59 189K 
[   ]us-15-Pickett-Staying-Persistent-In-Software-Defined-Networks.pdf14-Oct-2016 22:57 2.0M 
[   ]us-15-Pitts-Repurposing-OnionDuke-A-Single-Case-Study-Around-Reusing-Nation-State-Malware-wp.pdf14-Oct-2016 22:49 3.2M 
[   ]us-15-Pitts-Repurposing-OnionDuke-A-Single-Case-Study-Around-Reusing-Nation-State-Malware.pdf14-Oct-2016 22:51 8.7M 
[   ]us-15-Remes-Internet-Plumbing-For-Security-Professionals-The-State-Of-BGP-Security-wp.pdf14-Oct-2016 22:43 107K 
[   ]us-15-Remes-Internet-Plumbing-For-Security-Professionals-The-State-Of-BGP-Security.pdf14-Oct-2016 22:43 1.1M 
[   ]us-15-Seaborn-Exploiting-The-DRAM-Rowhammer-Bug-To-Gain-Kernel-Privileges.pdf14-Oct-2016 22:38 1.0M 
[   ]us-15-Shen-Attacking-Your-Trusted-Core-Exploiting-Trustzone-On-Android-wp.pdf14-Oct-2016 22:23 213K 
[   ]us-15-Shen-Attacking-Your-Trusted-Core-Exploiting-Trustzone-On-Android.pdf14-Oct-2016 22:24 6.4M 
[   ]us-15-Siman-The-Node-Js-Highway-Attacks-Are-At-Full-Throttle.pdf14-Oct-2016 23:01 713K 
[   ]us-15-Vandevanter-Exploiting-XXE-Vulnerabilities-In-File-Parsing-Functionality.pdf14-Oct-2016 22:38 1.0M 
[   ]us-15-Wang-FileCry-The-New-Age-Of-XXE-ie-wp.pdf14-Oct-2016 22:39 722K 
[   ]us-15-Wang-FileCry-The-New-Age-Of-XXE.pdf14-Oct-2016 22:39 10M 
[   ]us-15-Wang-Review-And-Exploit-Neglected-Attack-Surface-In-iOS-8.pdf14-Oct-2016 22:52 3.6M 
[   ]us-15-Wardle-Writing-Bad-A-Malware-For-OS-X.pdf14-Oct-2016 23:06 47M 
[   ]us-15-Xenakis-ROPInjector-Using-Return-Oriented-Programming-For-Polymorphism-And-Antivirus-Evasion-wp.pdf14-Oct-2016 22:53 707K 
[   ]us-15-Xu-Ah-Universal-Android-Rooting-Is-Back-wp.pdf14-Oct-2016 22:22 567K 
[   ]us-15-Xu-Ah-Universal-Android-Rooting-Is-Back.pdf14-Oct-2016 22:22 4.6M 
[   ]us-15-Yu-Cloning-3G-4G-SIM-Cards-With-A-PC-And-An-Oscilloscope-Lessons-Learned-In-Physical-Security-wp.pdf14-Oct-2016 22:30 1.5M 
[   ]us-15-Yu-Cloning-3G-4G-SIM-Cards-With-A-PC-And-An-Oscilloscope-Lessons-Learned-In-Physical-Security.pdf28-Sep-2016 13:15 2.4M 
[   ]us-15-Zhang-Bypass-Control-Flow-Guard-Comprehensively-wp.pdf14-Oct-2016 22:29 425K 
[   ]us-15-Zhang-Bypass-Control-Flow-Guard-Comprehensively.pdf14-Oct-2016 22:29 642K 
[   ]us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad-And-The-Ugly-wp.pdf14-Oct-2016 23:06 2.3M 
[   ]us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad-And-The-Ugly.pdf14-Oct-2016 23:06 6.4M 
[   ]us-16-Adrian-A-Retrospective-On-The-Use-of-Export-Cryptography.pdf14-Oct-2016 20:51 3.4M 
[   ]us-16-Alsaheel-Using-EMET-To-Disable-EMET-wp.pdf14-Oct-2016 21:41 7.0M 
[   ]us-16-Alsaheel-Using-EMET-To-Disable-EMET.pdf14-Oct-2016 21:41 699K 
[   ]us-16-Amiga-Account-Jumping-Post-Infection-Persistency-And-Lateral-Movement-In-AWS-wp.pdf14-Oct-2016 20:52 410K 
[   ]us-16-Amiga-Account-Jumping-Post-Infection-Persistency-And-Lateral-Movement-In-AWS.pdf14-Oct-2016 20:52 7.0M 
[   ]us-16-Beery-The-Remote-Malicious-Butler-Did-It-wp.pdf14-Oct-2016 21:38 1.8M 
[   ]us-16-Beery-The-Remote-Malicious-Butler-Did-It.pdf14-Oct-2016 21:38 6.1M 
[   ]us-16-Branco-DPTrace-Dual-Purpose-Trace-For-Exploitability-Analysis-Of-Program-Crashes-wp.pdf14-Oct-2016 21:07 3.5M 
[   ]us-16-Branco-DPTrace-Dual-Purpose-Trace-For-Exploitability-Analysis-Of-Program-Crashes.pdf14-Oct-2016 21:08 34M 
[   ]us-16-Bratus-Intra-Process-Memory-Protection-For-Applications-On-ARM-And-x86-wp.pdf14-Oct-2016 21:12 373K 
[   ]us-16-Bratus-Intra-Process-Memory-Protection-For-Applications-On-ARM-And-x86.pdf14-Oct-2016 21:10 2.8M 
[   ]us-16-Bulazel-AVLeak-Fingerprinting-Antivirus-Emulators-For-Advanced-Malware-Evasion.pdf14-Oct-2016 20:58 4.8M 
[   ]us-16-Chen-Subverting-Apple-Graphics-Practical-Approaches-To-Remotely-Gaining-Root-wp.pdf14-Oct-2016 21:16 475K 
[   ]us-16-Chen-Subverting-Apple-Graphics-Practical-Approaches-To-Remotely-Gaining-Root.pdf14-Oct-2016 21:16 13M 
[   ]us-16-Chong-Breaking-FIDO-Are-Exploits-In-There.pdf14-Oct-2016 21:01 1.2M 
[   ]us-16-Ermishkin-Viral-Video-Exploiting-Ssrf-In-Video-Converters.pdf14-Oct-2016 21:42 4.1M 
[   ]us-16-FitzPatrick-The-Tao-Of-Hardware-The-Te-Of-Implants-wp.pdf14-Oct-2016 21:39 1.1M 
[   ]us-16-FitzPatrick-The-Tao-Of-Hardware-The-Te-Of-Implants.pdf14-Oct-2016 21:39 6.7M 
[   ]us-16-Fogh-Using-Undocumented-CPU-Behaviour-To-See-Into-Kernel-Mode-And-Break-KASLR-In-The-Process.pdf14-Oct-2016 21:43 2.8M 
[   ]us-16-Gelernter-Timing-Attacks-Have-Never-Been-So-Practical-Advanced-Cross-Site-Search-Attacks.pdf14-Oct-2016 21:40 1.6M 
[   ]us-16-Goncharov-BadWpad.pdf14-Oct-2016 21:00 11M 
[   ]us-16-Guarnieri-Iran-And-The-Soft-War-For-Internet-Dominance-wp.pdf14-Oct-2016 21:11 2.4M 
[   ]us-16-Hecker-Hacking-Next-Gen-ATMs-From-Capture-To-Cashout.pdf14-Oct-2016 21:09 595K 
[   ]us-16-Ivanov-Web-Application-Firewalls-Analysis-Of-Detection-Logic.pdf14-Oct-2016 21:44 2.5M 
[   ]us-16-Jang-Breaking-Kernel-Address-Space-Layout-Randomization-KASLR-With-Intel-TSX-wp.pdf14-Oct-2016 21:01 513K 
[   ]us-16-Jang-Breaking-Kernel-Address-Space-Layout-Randomization-KASLR-With-Intel-TSX.pdf14-Oct-2016 21:02 19M 
[   ]us-16-Jasek-GATTacking-Bluetooth-Smart-Devices-Introducing-a-New-BLE-Proxy-Tool-wp.pdf14-Oct-2016 21:08 866K 
[   ]us-16-Kaiser-Pwning-Your-Java-Messaging-With-Deserialization-Vulnerabilities-wp.pdf14-Oct-2016 21:14 879K 
[   ]us-16-Kaiser-Pwning-Your-Java-Messaging-With-Deserialization-Vulnerabilities.pdf14-Oct-2016 21:15 4.6M 
[   ]us-16-Kotler-Crippling-HTTPS-With-Unholy-PAC.pdf14-Oct-2016 21:06 23M 
[   ]us-16-Kralevich-The-Art-Of-Defense-How-Vulnerabilities-Help-Shape-Security-Features-And-Mitigations-In-Android.pdf14-Oct-2016 21:17 1.5M 
[   ]us-16-Krstic.pdf14-Oct-2016 21:00 1.0M 
[   ]us-16-Lei-The-Risk-From-Power-Lines-How-To-Sniff-The-G3-And-Prime-Data-And-Detect-The-Interfere-Attack-wp.pdf14-Oct-2016 21:39 164K 
[   ]us-16-Leibowitz-Horse-Pill-A-New-Type-Of-Linux-Rootkit.pdf14-Oct-2016 21:09 1.1M 
[   ]us-16-Luan-Ouroboros-Tearing-Xen-Hypervisor-With-The-Snake-wp.pdf14-Oct-2016 21:13 1.1M 
[   ]us-16-Luan-Ouroboros-Tearing-Xen-Hypervisor-With-The-Snake.pdf14-Oct-2016 21:13 2.0M 
[   ]us-16-Malone-Using-An-Expanded-Cyber-Kill-Chain-Model-To-Increase-Attack-Resiliency.pdf14-Oct-2016 21:41 1.9M 
[   ]us-16-Mandt-Demystifying-The-Secure-Enclave-Processor.pdf14-Oct-2016 21:07 3.3M 
[   ]us-16-McGrew-Secure-Penetration-Testing-Operations-Demonstrated-Weaknesses-In-Learning-Material-And-Tools-wp.pdf14-Oct-2016 21:15 94K 
[   ]us-16-McGrew-Secure-Penetration-Testing-Operations-Demonstrated-Weaknesses-In-Learning-Material-And-Tools.pdf14-Oct-2016 21:16 218K 
[   ]us-16-Mendoza-Samsung-Pay-Tokenized-Numbers-Flaws-And-Issues-wp.pdf14-Oct-2016 21:16 1.0M 
[   ]us-16-Metcalf-Beyond-The-MCSE-Active-Directory-For-The-Security-Professional-wp.pdf14-Oct-2016 21:00 1.4M 
[   ]us-16-Metcalf-Beyond-The-MCSE-Active-Directory-For-The-Security-Professional.pdf14-Oct-2016 21:00 3.8M 
[   ]us-16-Mittal-AMSI-How-Windows-10-Plans-To-Stop-Script-Based-Attacks-And-How-Well-It-Does-It.pdf14-Oct-2016 20:54 3.0M 
[   ]us-16-Molinyawe-Shell-On-Earth-From-Browser-To-System-Compromise-wp.pdf14-Oct-2016 20:49 13M 
[   ]us-16-Molinyawe-Shell-On-Earth-From-Browser-To-System-Compromise.pdf14-Oct-2016 20:49 4.7M 
[   ]us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf14-Oct-2016 20:50 2.4M 
[   ]us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf14-Oct-2016 20:50 4.2M 
[   ]us-16-Nakibly-TCP-Injection-Attacks-in-the-Wild-A-Large-Scale-Study-wp.pdf14-Oct-2016 21:16 221K 
[   ]us-16-Nakibly-TCP-Injection-Attacks-in-the-Wild-A-Large-Scale-Study.pdf14-Oct-2016 21:17 6.9M 
[   ]us-16-Nipravsky-Certificate-Bypass-Hiding-And-Executing-Malware-From-A-Digitally-Signed-Executable-wp.pdf14-Oct-2016 21:05 624K 
[   ]us-16-OFlynn-A-Lightbulb-Worm-wp.pdf14-Oct-2016 20:51 5.5M 
[   ]us-16-OFlynn-A-Lightbulb-Worm.pdf14-Oct-2016 20:51 9.7M 
[   ]us-16-Oh-The-Art-of-Reverse-Engineering-Flash-Exploits-wp.pdf14-Oct-2016 21:17 1.1M 
[   ]us-16-Ortisi-Recover-A-RSA-Private-Key-From-A-TLS-Session-With-Perfect-Forward-Secrecy-wp.pdf14-Oct-2016 21:15 1.3M 
[   ]us-16-Ortisi-Recover-A-RSA-Private-Key-From-A-TLS-Session-With-Perfect-Forward-Secrecy.pdf14-Oct-2016 21:15 2.4M 
[   ]us-16-Ossmann-GreatFET-Making-GoodFET-Great-Again-wp.pdf14-Oct-2016 21:08 670K 
[   ]us-16-Ozavci-VoIP-Wars-The-Phreakers-Awaken.pdf14-Oct-2016 21:42 6.3M 
[   ]us-16-Pierce-Capturing-0days-With-PERFectly-Placed-Hardware-Traps-wp.pdf14-Oct-2016 21:05 945K 
[   ]us-16-Pierce-Capturing-0days-With-PERFectly-Placed-Hardware-Traps.pdf14-Oct-2016 21:05 3.8M 
[   ]us-16-Quintin-When-Governments-Attack-State-Sponsored-Malware-Attacks-Against-Activists-Lawyers-And-Journalists.pdf14-Oct-2016 21:44 7.2M 
[   ]us-16-Sharkey-Breaking-Hardware-Enforced-Security-With-Hypervisors.pdf14-Oct-2016 21:01 2.9M 
[   ]us-16-Silvanovich-The-Year-In-Flash.pdf14-Oct-2016 21:39 2.2M 
[   ]us-16-Simon-Access-Keys-Will-Kill-You-Before-You-Kill-The-Password.pdf14-Oct-2016 20:52 587K 
[   ]us-16-Sistrunk-Triplett-Whats-The-DFIRence-For-ICS.pdf14-Oct-2016 21:44 4.5M 
[   ]us-16-Tan-Bad-For-Enterprise-Attacking-BYOD-Enterprise-Mobile-Security-Solutions-wp.pdf14-Oct-2016 20:59 1.4M 
[   ]us-16-Tan-Bad-For-Enterprise-Attacking-BYOD-Enterprise-Mobile-Security-Solutions.pdf14-Oct-2016 20:59 19M 
[   ]us-16-Thomas-Can-You-Trust-Me-Now.pdf14-Oct-2016 21:03 15M 
[   ]us-16-Tian-1000-Ways-To-Die-In-Mobile-OAuth-wp.pdf14-Oct-2016 20:49 356K 
[   ]us-16-Tian-1000-Ways-To-Die-In-Mobile-OAuth.pdf14-Oct-2016 20:49 3.5M 
[   ]us-16-Valtman-Breaking-Payment-Points-of-Interaction.pdf14-Oct-2016 21:02 17M 
[   ]us-16-VanGoethem-HEIST-HTTP-Encrypted-Information-Can-Be-Stolen-Through-TCP-Windows-wp.pdf14-Oct-2016 21:09 603K 
[   ]us-16-VanGoethem-HEIST-HTTP-Encrypted-Information-Can-Be-Stolen-Through-TCP-Windows.pdf14-Oct-2016 21:09 3.6M 
[   ]us-16-Wang-Pangu-9-Internals.pdf14-Oct-2016 21:14 3.9M 
[   ]us-16-Wilhelm-Xenpwn-Breaking-Paravirtualized-Devices-wp.pdf14-Oct-2016 21:45 5.2M 
[   ]us-16-Wojtczuk-Analysis-Of-The-Attack-Surface-Of-Windows-10-Virtualization-Based-Security-wp.pdf14-Oct-2016 20:56 1.2M 
[   ]us-16-Wolff-Applied-Machine-Learning-For-Data-Exfil-And-Other-Fun-Topics.pdf14-Oct-2016 20:56 13M 
[   ]us-16-Wu-Dark-Side-Of-The-DNS-Force.pdf14-Oct-2016 21:06 7.2M 
[   ]us-16-Yavo-Captain-Hook-Pirating-AVs-To-Bypass-Exploit-Mitigations-wp.pdf14-Oct-2016 21:03 1.6M 
[   ]us-16-Yavo-Captain-Hook-Pirating-AVs-To-Bypass-Exploit-Mitigations.pdf14-Oct-2016 21:03 2.5M 
[   ]us-16-Yu-BadTunnel-How-Do-I-Get-Big-Brother-Power-wp.pdf14-Oct-2016 20:59 438K 
[   ]us-16-Zadegan-Abusing-Bleeding-Edge-Web-Standards-For-AppSec-Glory.pdf14-Oct-2016 20:51 2.7M 
[   ]us-16-Zhang-Adaptive-Kernel-Live-Patching-An-Open-Collaborative-Effort-To-Ameliorate-Android-N-Day-Root-Exploits-wp.pdf14-Oct-2016 20:53 5.8M 
[   ]us-16-Zhang-Adaptive-Kernel-Live-Patching-An-Open-Collaborative-Effort-To-Ameliorate-Android-N-Day-Root-Exploits.pdf14-Oct-2016 20:52 7.1M 
[   ]us-16-Ziv-Unleash-The-Infection_Monkey-A-Modern-Alternative-To-Pen-Tests-wp.pdf14-Oct-2016 21:40 1.1M 
[   ]us-16-Ziv-Unleash-The-Infection_Monkey-A-Modern-Alternative-To-Pen-Tests.pdf14-Oct-2016 21:40 2.2M 

Apache/2.2.22 (Debian) Server at lepointdeau.fr Port 80