Index of /docs/Slides/2022
Name Last modified Size Description
Parent Directory -
Signature_Based_Detection_Using_Network_Timing_Josh_Pyorre.pdf 2022-12-17 00:15 37M
Hacker_To_Honcho_Darren_Jones_Julian_Botham.pdf 2023-01-10 23:47 17M
Identification_of_the_Location_in_the_5G_Network_Giorgi_Akhalaia.pdf 2022-11-30 23:41 9.4M
Auditing_Closed_Source_Trusted_Applications_for_Qualcomm_Secure_Execution_Environment_(QSEE)_Hector Marco_&_Fernando_Vano.pdf 2022-11-30 23:41 9.3M
Hacking_More_Secure_Portable_Storage_Devices_Matthias_Deeg.pdf 2022-11-30 23:41 8.1M
Keynote_-_Complexity_killed_the_Cat_-_René_Pfeiffer.pdf 2022-11-30 23:41 7.7M
GitHub_Actions_Security_Landscape_Ronen_Slavin.pdf 2022-11-30 23:41 7.2M
Fighting_Fire_With_Fire_–_Detecting_DNS-tunneling_With_DNS_Artsiom_Holub.pdf 2023-01-10 23:46 6.7M
Protecting_Your_Web_Application_API_With_CrowdSec_Klaus_Agnoletti.pdf 2022-11-30 23:42 6.6M
Cypher_Query_Injection_Noy_Pearl.pdf 2022-11-30 23:41 6.3M
Malware_and_Exfiltration_:_A_Telegram_Story_Godwin_Attigah.pdf 2022-11-30 23:41 5.9M
Ukrainian-Russian_Warfare_In_Cyberspace_Sergiy_Gnatyuk .pdf 2022-12-17 00:14 5.7M
OPSEC-The_Discipline_Of_The_Grey_Man_Robert_Sell.pdf 2022-11-30 23:42 5.4M
Communicative_Incident_Response_Hauke_Gierow_Paul_Gärtner.pdf 2023-01-10 23:44 4.5M
Vanquish_Analysis_Everywhere_With_Smartphones_Hiroyuki_Kakara.pdf 2022-11-30 23:42 4.4M
Melting_the_DNS_Iceberg_Timo_Longin.pdf 2023-01-10 23:47 4.1M
Wireless_Keystroke_Injection_As_An_Attack_Vector_During_Physical_Assessments_Simonovi_Sergei.pdf 2022-12-17 00:13 3.8M
Post-quantum_Verkle_Signature_Scheme_Maksim_Iavich.pdf 2022-11-30 23:42 3.1M
Towards_The_Automation_Of_Highly_Targeted_Phishing_Attacks_With_Adversarial_Artificial_Intelligence_Francesco_ Morano_ and_ Enrico_Frumento.pdf 2023-01-10 23:48 3.0M
Detecting_the_Unknowns-Mobile_Network_Operators_Cyber_Resilience_In_Responding_To_0-day_Exploit_Imran_Saleem.pdf 2022-12-17 00:14 2.5M
We_are_sorry_that_your_mouse_is_admin_Oliver_Schwarz.pdf 2022-12-17 00:13 2.1M
Attacking_Developer_Environment_Through_Drive-by_Localhost_Attacks_Joseph_Beeton.pdf 2022-12-17 00:13 2.1M
The_Need_For_a_Human_Touch_In_Cyber_Security_Erlend_Andreas_Gjære .pdf 2022-12-17 00:14 2.0M
End-to-end_Health_Data_Privacy_Using_Secure_5G_Data_Channels_-_Dr_Razvan_Bocu.pdf 2022-11-30 23:41 1.8M
Faking_at_Level_1_Thomas_Weber.pdf 2022-11-30 23:41 912K
Machine_Learning_Use_In_OSINT_Giorgi_Iashvili.pdf 2022-11-30 23:41 711K
Iran_A_Top_Tier_Cyber_Threat_Actor_Steph_Shample.pdf 2022-11-30 23:41 592K
Keynote_-_Complexity_killed_the_Cat/ 2022-12-30 12:11 -