Index of /docs/Slides/2017
Name Last modified Size Description
Parent Directory -
A_Survey_On_Automated_Dynamic_Malware_Analysis_Evasion_And_Counter-Evasion_PC_Mobile_And_Web_Alexei_Bulazel.pdf 2017-12-01 15:33 723K
BITSInject_Dor_Azouri.pdf 2017-11-28 11:25 1.0M
Behavior_based_Secure_and_resilient_System_Development_Dr._Muhammad_Taimoor_Khan.pdf 2017-12-01 15:33 1.8M
BitCracker_BitLocker_meets_GPUs_Elena_Agostini.pdf 2017-11-23 09:32 2.6M
Building_Security_Teams_Astera_Schneeweisz.pdf 2017-12-11 09:34 426K
Bypassing_Web_Application_Firewalls_Khalil_Bijjou.pdf .pdf 2017-11-24 11:35 4.0M
Cloud_Of_Suspicion_Scaling_Up_Phishing_Campaigns_Using_Google_Apps_Scripts_Maor_Bin.pdf 2017-12-05 13:42 4.2M
Cloud_Of_Suspicion_Scaling_Up_Phishing_Campaigns_Using_Google_Apps_Scripts_Maor_Bin.pptx 2017-12-05 13:41 6.4M
Enhancing Control Flow Graph_Based_Binary_Function_Identification_Clemens_Jonischkeit.pdf 2017-11-30 11:26 139K
Essential_Infrastructure_Interdependencies_-_Herbert_Saurugg.pdf 2017-12-01 15:35 21M
Essential_Infrastructure_Interdependencies_-_Herbert_Saurugg.pptx 2017-12-01 15:37 19M
Forensic_Accounting_Ulrike_Hugl.pdf 2017-12-01 15:37 954K
Hacking_the_Brain_-_Stefan_Hager.pdf 2017-12-01 15:38 7.7M
How_secure_are_your_VoLTE_and_VoWiFi_Calls_Sreepriya_Chalakkal.pdf 2017-11-24 10:11 2.7M
How_to_execute_code_on_a_forensic_Workstation_-_Wolfgang_Ettlinger.pdf 2017-12-01 15:38 1.1M
How_to_hide_your_Browser_0-days_Zoltan_Balazs.pdf 2017-11-22 11:32 19M
Insecurity_in_Information_Technology_Tanya_Janca.pdf 2018-01-03 10:22 12M
Insecurity_in_Information_Technology_Tanya_Janca.pptx 2018-01-03 10:22 4.6M
Intel_AMT_Using_&_Abusing_The_Ghost_In_The_Machine_-_Parth_Shukla.pdf 2017-11-24 12:01 3.9M
Lock_Stock_and_two_smoking_Apples_Alex_Plaskett_James_Loureiro.pdf 2017-11-22 12:13 6.8M
ML_Clustering_Attacks_a_walk_outside_the_lab_Gilad_Yehudai.pdf 2017-12-01 15:38 1.4M
ML_Clustering_Attacks_a_walk_outside_the_lab_Gilad_Yehudai.pptx 2017-12-01 15:38 1.4M
Making_Security_Awareness_measurable_Stefan_Schumacher .pdf 2017-12-01 15:38 609K
Malware_Analysis_Chiheb_Chebb.pdf 2018-01-09 21:28 2.8M
Next-Gen_Mirai_Balthasar_Martin_Fabian_Bräunlein.pdf 2017-12-01 15:38 973K
Normal_Permissions_in_Android_Constantinos_Patsakis.pdf 2017-11-22 12:31 6.4M
OpenDXL_In_Active_Response_Scenarios_Tarmo_Randel.pdf 2017-12-06 10:14 2.9M
Out-Of-Order_Execution_and_its_applications_Sophia_dAntoine.pdf 2017-11-30 13:43 2.8M
Out-Of-Order_Execution_and_its_applications_Sophia_dAntoine.pptx 2017-11-30 13:43 7.4M
The_Future_of_the_Internet_-_Josh_Pyorre.pdf 2017-12-06 10:58 19M
Visualizing_Botnet_Infrastructure_-_Andrea_Scarfo__Josh_Pyorre.pdf 2017-12-06 10:58 12M
Who_Hid_My_Desktop_Or_Safran_Pavel_Asinovsky.pdf 2017-12-11 09:19 1.6M