Index of /docs/Slides/2019
 Name                                                                                                           Last modified      Size  Description
 Name                                                                                                           Last modified      Size  Description
![[PARENTDIR]](/icons/back.gif) Parent Directory                                                                                                                    -
 Parent Directory                                                                                                                    -   
![[DIR]](/icons/folder.gif) ROOTs/                                                                                                         2019-12-21 23:30    -
 ROOTs/                                                                                                         2019-12-21 23:30    -   
![[   ]](/icons/layout.gif) What’s_Wrong_with_WebSocket_APIs?_Unveiling_Vulnerabilities_in_WebSocket_APIs_Mikhail_Egorov.pdf             2019-12-21 23:30  1.2M
 What’s_Wrong_with_WebSocket_APIs?_Unveiling_Vulnerabilities_in_WebSocket_APIs_Mikhail_Egorov.pdf             2019-12-21 23:30  1.2M  
![[   ]](/icons/layout.gif) What_Has_Data_Science_Got_To_Do_With_It?_Thordis_Thorsteins.pdf                                                2019-12-21 23:30   93M
 What_Has_Data_Science_Got_To_Do_With_It?_Thordis_Thorsteins.pdf                                                2019-12-21 23:30   93M  
![[   ]](/icons/layout.gif) The_Turtle_Gone_Ninja_Ophir_Harpaz_Daniel_Goldberg.pdf                                                         2019-12-21 23:24  4.3M
 The_Turtle_Gone_Ninja_Ophir_Harpaz_Daniel_Goldberg.pdf                                                         2019-12-21 23:24  4.3M  
![[   ]](/icons/layout.gif) The_Future_Is_Here-Modern_Attack_Surface_On_Automotive_Lior_Yaari.pdf                                          2019-12-21 23:24  2.1M
 The_Future_Is_Here-Modern_Attack_Surface_On_Automotive_Lior_Yaari.pdf                                          2019-12-21 23:24  2.1M  
![[   ]](/icons/layout.gif) Still_Secure_We_Empower_What_We_Harden_Because_We_Can_Conceal_-_Yury_Chemerkin.pdf                             2019-12-21 23:23  4.7M
 Still_Secure_We_Empower_What_We_Harden_Because_We_Can_Conceal_-_Yury_Chemerkin.pdf                             2019-12-21 23:23  4.7M  
![[   ]](/icons/layout.gif) Setting_up_an_Open_Source_Threat_Detection_Program_Lance_Buttars.pdf                                           2019-12-21 23:23  3.3M
 Setting_up_an_Open_Source_Threat_Detection_Program_Lance_Buttars.pdf                                           2019-12-21 23:23  3.3M  
![[   ]](/icons/layout.gif) SD-WAN_Secure_Communications_Design_and_Vulnerabilities_Denis_Kolegov.pdf                                      2019-12-21 23:23  5.0M
 SD-WAN_Secure_Communications_Design_and_Vulnerabilities_Denis_Kolegov.pdf                                      2019-12-21 23:23  5.0M  
![[   ]](/icons/layout.gif) S.C.A.R.E._-_Static_Code_Analysis_Recognition_Evasion_Andreas_Wiegenstein.pdf                                  2019-12-21 23:23  2.6M
 S.C.A.R.E._-_Static_Code_Analysis_Recognition_Evasion_Andreas_Wiegenstein.pdf                                  2019-12-21 23:23  2.6M  
![[   ]](/icons/layout.gif) Practical_Security_Awareness_-_Lessons_Learnt_and_Best_Practices_Stefan_Schumacher.pdf                         2019-12-21 23:22  368K
 Practical_Security_Awareness_-_Lessons_Learnt_and_Best_Practices_Stefan_Schumacher.pdf                         2019-12-21 23:22  368K  
![[   ]](/icons/layout.gif) New_Tales_of_Wireless_Input_Devices_Matthias_Deeg.pdf                                                          2019-12-21 23:22  5.6M
 New_Tales_of_Wireless_Input_Devices_Matthias_Deeg.pdf                                                          2019-12-21 23:22  5.6M  
![[   ]](/icons/layout.gif) Mobile_Network_Hacking_Allover-IP_Edition_Luca_Melette_Sina_Yadzanmehr.pdf                                     2019-12-21 23:22  638K
 Mobile_Network_Hacking_Allover-IP_Edition_Luca_Melette_Sina_Yadzanmehr.pdf                                     2019-12-21 23:22  638K  
![[   ]](/icons/layout.gif) Lost_in_(DevOps)_Space–Practical_Approach_for_“Lightway”_Threat_Modeling_as_a_Code_Vitaly_Davidoff_a.pdf 2019-12-21 23:22  147M
 Lost_in_(DevOps)_Space–Practical_Approach_for_“Lightway”_Threat_Modeling_as_a_Code_Vitaly_Davidoff_a.pdf 2019-12-21 23:22  147M  
![[   ]](/icons/layout.gif) Lost_in_(DevOps)_Space–Practical_Approach_for_“Lightway”_Threat_Modeling_as_a_Code_Vitaly_Davidoff.pdf   2019-12-21 23:12  5.0M
 Lost_in_(DevOps)_Space–Practical_Approach_for_“Lightway”_Threat_Modeling_as_a_Code_Vitaly_Davidoff.pdf   2019-12-21 23:12  5.0M  
![[   ]](/icons/layout.gif) Lauschgerät_Adrian_Vollmer.pdf                                                                                2019-12-21 23:12  1.8M
 Lauschgerät_Adrian_Vollmer.pdf                                                                                2019-12-21 23:12  1.8M  
![[   ]](/icons/layout.gif) Extracting_a_19-year-old_Code_Execution_from_WinRAR_Nadav_Grossman_a.pdf                                       2019-12-21 23:12  888M
 Extracting_a_19-year-old_Code_Execution_from_WinRAR_Nadav_Grossman_a.pdf                                       2019-12-21 23:12  888M  
![[   ]](/icons/layout.gif) Extracting_a_19-year-old_Code_Execution_from_WinRAR_Nadav_Grossman.pdf                                         2019-12-21 22:13  9.7M
 Extracting_a_19-year-old_Code_Execution_from_WinRAR_Nadav_Grossman.pdf                                         2019-12-21 22:13  9.7M  
![[   ]](/icons/layout.gif) Computer_Security_is_simple_the_World_is_not_Raphaël_Vinot_Quinn_Norton.pdf                                   2019-12-21 22:13   13M
 Computer_Security_is_simple_the_World_is_not_Raphaël_Vinot_Quinn_Norton.pdf                                   2019-12-21 22:13   13M  
![[   ]](/icons/layout.gif) Chinese_Police_and_CloudPets_-_Abraham_Aranguren.pdf                                                           2019-12-21 22:12  2.7M
 Chinese_Police_and_CloudPets_-_Abraham_Aranguren.pdf                                                           2019-12-21 22:12  2.7M  
![[   ]](/icons/layout.gif) Beyond_Windows_Forensics_with_Built-in_Microsoft_Tooling_Thomas_Fischer.pdf                                    2019-12-21 22:11  6.0M
 Beyond_Windows_Forensics_with_Built-in_Microsoft_Tooling_Thomas_Fischer.pdf                                    2019-12-21 22:11  6.0M  
![[   ]](/icons/layout.gif) Android_Malware_Adventures_Kürşat_Oğuzhan_Akıncı_Mert_Can_Coşkuner.pdf                                   2019-12-21 22:11  8.1M
 Android_Malware_Adventures_Kürşat_Oğuzhan_Akıncı_Mert_Can_Coşkuner.pdf                                   2019-12-21 22:11  8.1M  
![[   ]](/icons/layout.gif) A_Threat-based_Security_Monitoring_Approach_Using_Mitre_ATT&CK_Matrix_Patrick_Bareiss.pdf                      2019-12-21 22:11   39M
 A_Threat-based_Security_Monitoring_Approach_Using_Mitre_ATT&CK_Matrix_Patrick_Bareiss.pdf                      2019-12-21 22:11   39M