Index of /docs/Slides/2018
Name Last modified Size Description
Parent Directory -
A_Tour_of_Office_365,_Azure_&_SharePoint,_through_the_Eyes_of_a_Bug_Hunter___Ashar_Javed.pdf 2018-12-07 18:41 42K
Attacks_on_Mobile_Operators_Aleksandr_Kolchanov.pdf 2018-12-11 22:21 8.3M
Building_your_Own_WAF_as_a_Service_and_Forgetting_about_False_Positives_Juan_Berner.pdf 2018-12-07 18:41 1.6M
Can_Not_See_The_Wood_For_The_Trees_FrankAckermann.pdf 2018-12-07 18:41 1.7M
DNS_Exfiltration_and_Out-of-Band_Attacks_Nitesh_Shilpkar.pdf 2018-12-07 18:42 1.2M
EFAIL_and_other_Failures_of_E-Mail_Encryption___Hanno_Boeck.pdf 2018-12-07 18:42 45K
Everything_is_connected_Aleksandr_Kolchanov.pdf 2018-12-11 22:23 124M
Global_Deep_Scans_Luca_Melette_Fabian_Braeunlein.pdf 2018-12-28 16:31 656K
How_to_Communicate_about_IT_Security_without_Getting_the_Cybers_Hauke_Gierow_&_Tim_Berghoff.pdf 2018-12-28 16:31 1.3M
Information,_Threat_Intelligence,_and_Human_Factors_John_Bryk.pdf 2018-12-10 13:03 1.0M
Injecting_Security_Controls_into_Software_Applications_Katy_Anton.pdf 2018-12-10 11:29 3.1M
Leveraging_Endpoints_to_Boost_Incident_Response_Capabilities_Francisco_Galian_Mauro_Silva.pdf 2018-12-07 18:42 2.2M
Manipulating_Human_Memory_for_Fun_and_Profit_Stefan_Schumacher.pdf 2018-12-10 12:45 697K
Mapping_And_Tracking_Wifi_Networks_Caleb_Madrigal.pdf 2018-12-07 18:43 11M
Moving_Money_Jasmin_Klofta_Tom_Wills.pdf 2018-12-07 18:44 7.2M
New_Attack_Vectors_For_Mobile_Core_Networks_Silke_Holtmanns.pdf 2018-12-07 18:44 4.8M
Offpath_Attacks_Against_PKI_Markus_Brandt.pdf 2018-12-10 12:02 7.4M
Open_Source_Network_Monitoring_Paula_de_la_Hoz_Garrido.pdf 2018-12-10 11:20 7.3M
Orchestrating_Security_Tooling_With_AWS_Step_Functions_Jules_Denardou_Justin_Massey.pdf 2018-12-12 12:47 3.4M
Pure_In-Memory_(Shell)Code_Injection_in_Linux_Userland_reenz0h.pdf 2018-12-10 12:16 35M
ROOTS_Data_over_Sound_Matthias_Zeppelzauer.pdf 2018-12-07 18:44 4.1M
SS7_for_INFOSEC_Paul_Coggin.pdf 2018-12-07 18:45 4.0M
Security_as_a_Community_Healthcare_Eva_Blum-Dumontet.pdf 2018-12-10 12:31 2.1M
Suricata_and_XDP_Eric_Leblond.pdf 2018-12-28 16:36 2.4M
Uncovering_Vulnerabilities_in_Secure_Coding_Guidelines_Fernando_Arnaboldi.pdf 2018-12-28 16:33 7.3M
We're_All_Gonna_Die_-_Peter_Zinn.pdf 2018-12-17 09:23 50M
Who_Watches_the_Watcher?_Detecting_Hypervisor_Introspection_from_Unprivileged_Guests_Tomasz_Tuzel.pdf 2018-12-07 18:45 2.2M