Index of /docs/Slides/2015

Icon  Name                                                                                                                                    Last modified      Size  Description
[PARENTDIR] Parent Directory - [   ] illusoryTLS_Nobody_But Us_Impersonate_Tamper_and_Exploit_-_Alfonso_De_Gregorio.pdf 2015-12-17 13:01 13M [   ] ZigBee_SmartHomes_A_Hackers_Open_House_-_Tobias_Zillner,_Florian_Eichelberger.pdf 2015-12-02 11:22 13M [   ] Yes,_Now_YOU_Can_ Patch_That_Vulnerability_Too!_-_Mitja_Kolsek.pdf 2015-11-26 11:33 1.9M [   ] Visualizing_Wi-Fi_Packets_the_Hacker's_Way_-_Milan_Gabor.pdf 2015-12-24 11:40 3.7M [   ] Temet_Nosce_Know_Thy_Endpoint_Through_and_Through_Processes_to_Data_-_Thomas_Fischer.pdf 2015-12-09 11:32 4.0M [   ] Revisiting_SOHO_Router_Attacks_-_Jose_Antonio _Rodriguez_Garcia,_Ivan _Sanz_de_Castro,_Álvaro_Folgado_Rueda.pdf 2015-12-02 11:48 5.8M [   ] OSINT_Barncat___Mining_Malware_for_Intelligence_at_Scale_-_John_Bambenek.pdf 2015-11-20 10:40 57M [   ] Not_so_Smart_On_ Smart_TV_Apps_-_Marcus_Niemietz.pdf 2015-11-26 13:36 16M [   ] Legal_Responses_ Against_Cyber_ Incidents_-_Oscar_Serrano.pdf 2015-12-03 10:57 47M [   ] How_To_Break_XML_Encryption_-_Automatically_-_Juraj_Somorovsky.pdf 2015-12-02 10:37 3.2M [   ] Have_We_Penetrated_Yet_-_Johnny_Deutsch.pdf 2016-01-07 10:52 459K [   ] Hacking Cookies in Modern Web Applications_and_Browsers_-_Dawid_Czagan.pdf 2015-11-26 13:09 75K [   ] German_Privacy_Law_And_IT_Security_-_Stefan_Schumacher.pdf 2015-12-02 11:08 465K [   ] File_Format_Fuzzing_in_Android_-Alexandru_Blanda.pdf 2015-12-01 15:06 605K [   ] Extending_a_Legacy_ Platform_Providing_a_Minimalistic,_Secure_Single-Sign-On-Library_-_Bernhard_Goeschelberger,_Sebastian_Goettfert.pdf 2015-12-01 14:37 329K [   ] Deactivating_Endpoint_Protection_Software_in_an_Unauthorized_ Manner_-_Matthias_Deeg.pdf 2015-12-02 11:26 1.7M [   ] DDoS_-_Barbarians_at_the_Gate(way)_-_Dave_Lewis.pdf 2015-12-09 10:35 11M [   ] Cyber_Cyber_Cyber_Warfare___Mistakes_of_the_DoDs_-_Raoul Chiesa.pdf 2015-11-20 10:22 2.7M [   ] Cryptography_Tools_-_ Identity_Vectors_for_ Djihadists_-_Julie_Gommes.pdf 2015-12-09 11:15 1.1M [   ] Crypto-Segregation_of_Duty_within_Work-flows_-_Thomas_Maus.pdf 2015-12-09 12:27 259K [   ] Continuous_Intrusion_Why_CI_Tools_Are_an_Attacker's_Best_Friends_-_Nikhil_Mittal.pdf 2015-12-02 12:44 6.2M [   ] Chw00t_How_To_Break Out_from_Various_Chroot_Solutions_-_Bucsay_Balazs.pdf 2015-11-26 10:38 6.4M [   ] Can_societies_manage_ the_SIGINT_monster_-_Duncan_Campbell.pdf 2015-11-26 10:33 14M [   ] Building_a_Better_ Honeypot_Network_-_Josh_Pyorre.pdf 2015-12-03 14:09 21M [   ] Bridging_the_Air-Gap_Data_Exfiltration_from_Air-Gap_ Networks_-_Yisroel_Mirsky.pdf 2015-11-26 10:31 1.3M [   ] Agile_Security_The_Good,_The_Bad,_(and_Mostly)_The_Ugly_-_Daniel_Liber.pdf 2015-11-21 17:03 937K [   ] Advanced_SOHO_ Router_Exploitation_-Lyon_Yang.pdf 2015-12-15 11:33 11M