Index of /docs/Slides/2019

Icon  Name                                                                                                           Last modified      Size  Description
[PARENTDIR] Parent Directory - [DIR] ROOTs/ 2019-12-21 23:30 - [   ] What’s_Wrong_with_WebSocket_APIs?_Unveiling_Vulnerabilities_in_WebSocket_APIs_Mikhail_Egorov.pdf 2019-12-21 23:30 1.2M [   ] What_Has_Data_Science_Got_To_Do_With_It?_Thordis_Thorsteins.pdf 2019-12-21 23:30 93M [   ] The_Turtle_Gone_Ninja_Ophir_Harpaz_Daniel_Goldberg.pdf 2019-12-21 23:24 4.3M [   ] The_Future_Is_Here-Modern_Attack_Surface_On_Automotive_Lior_Yaari.pdf 2019-12-21 23:24 2.1M [   ] Still_Secure_We_Empower_What_We_Harden_Because_We_Can_Conceal_-_Yury_Chemerkin.pdf 2019-12-21 23:23 4.7M [   ] Setting_up_an_Open_Source_Threat_Detection_Program_Lance_Buttars.pdf 2019-12-21 23:23 3.3M [   ] SD-WAN_Secure_Communications_Design_and_Vulnerabilities_Denis_Kolegov.pdf 2019-12-21 23:23 5.0M [   ] S.C.A.R.E._-_Static_Code_Analysis_Recognition_Evasion_Andreas_Wiegenstein.pdf 2019-12-21 23:23 2.6M [   ] Practical_Security_Awareness_-_Lessons_Learnt_and_Best_Practices_Stefan_Schumacher.pdf 2019-12-21 23:22 368K [   ] New_Tales_of_Wireless_Input_Devices_Matthias_Deeg.pdf 2019-12-21 23:22 5.6M [   ] Mobile_Network_Hacking_Allover-IP_Edition_Luca_Melette_Sina_Yadzanmehr.pdf 2019-12-21 23:22 638K [   ] Lost_in_(DevOps)_Space–Practical_Approach_for_“Lightway”_Threat_Modeling_as_a_Code_Vitaly_Davidoff_a.pdf 2019-12-21 23:22 147M [   ] Lost_in_(DevOps)_Space–Practical_Approach_for_“Lightway”_Threat_Modeling_as_a_Code_Vitaly_Davidoff.pdf 2019-12-21 23:12 5.0M [   ] Lauschgerät_Adrian_Vollmer.pdf 2019-12-21 23:12 1.8M [   ] Extracting_a_19-year-old_Code_Execution_from_WinRAR_Nadav_Grossman_a.pdf 2019-12-21 23:12 888M [   ] Extracting_a_19-year-old_Code_Execution_from_WinRAR_Nadav_Grossman.pdf 2019-12-21 22:13 9.7M [   ] Computer_Security_is_simple_the_World_is_not_Raphaël_Vinot_Quinn_Norton.pdf 2019-12-21 22:13 13M [   ] Chinese_Police_and_CloudPets_-_Abraham_Aranguren.pdf 2019-12-21 22:12 2.7M [   ] Beyond_Windows_Forensics_with_Built-in_Microsoft_Tooling_Thomas_Fischer.pdf 2019-12-21 22:11 6.0M [   ] Android_Malware_Adventures_Kürşat_Oğuzhan_Akıncı_Mert_Can_Coşkuner.pdf 2019-12-21 22:11 8.1M [   ] A_Threat-based_Security_Monitoring_Approach_Using_Mitre_ATT&CK_Matrix_Patrick_Bareiss.pdf 2019-12-21 22:11 39M