Index of /materials/


../
D1 COMMSEC - AI Security - Why, What, How - Ale..> 14-Oct-2019 08:14            14992542
D1 COMMSEC - AI for Security or Security for AI..> 14-Oct-2019 08:29            24028013
D1 COMMSEC - Discover Invisible Fileless Webshe..> 14-Oct-2019 08:25             8836807
D1 COMMSEC - Docker Container (In)Security - Su..> 14-Oct-2019 08:25            14731186
D1 COMMSEC - Hacking the 0day Market - Andrea Z..> 14-Oct-2019 08:26             4768232
D1 COMMSEC - Modular PCB Design for Makers - Br..> 14-Oct-2019 08:17            14320834
D1 COMMSEC - New Threats are Already Around You..> 14-Oct-2019 08:18             5470256
D1 COMMSEC - Practical Approaches for Testing a..> 14-Oct-2019 08:23             4416268
D1 COMMSEC - Securing Your Laptop Like You Mean..> 14-Oct-2019 08:23             9794145
D2 COMMSEC - Call Of Duty- Modern Browser Warfa..> 14-Oct-2019 08:35             4134957
D2 COMMSEC - Looking Through Muddy Waters- Insi..> 14-Oct-2019 08:33             9381167
D2 COMMSEC - On the Wings of Time- Demystifying..> 14-Oct-2019 08:33             4043749
D2 COMMSEC - On the Wings of Time- Demystifying..> 14-Oct-2019 08:32             4043749
D2 COMMSEC - Physics of Security - Tomas Drab.pdf  14-Oct-2019 11:05             4366632
D2 COMMSEC - Transferability of Adversarial Exa..> 14-Oct-2019 08:32            13677899
D3 COMMSEC - Are You Insured Around Cyber Crime..> 15-Oct-2019 11:00             2986393
D3 COMMSEC - Cloud Computing Appeal and Complex..> 15-Oct-2019 11:00              983288
D3 HIGHLIGHT - Quantum Distruption - Jose Ignac..> 15-Oct-2019 11:10            16409775
D3 HIGHLIGHT - What Would a Quantum Computer Do..> 15-Oct-2019 11:00             1268783
D3 TRACK 1 - Debunking Fault Injection Myths an..> 18-Oct-2019 03:29             8266835
D3 TRACK 1 - Fuzzing Farm Monoculture - Are We ..> 15-Oct-2019 11:12             7126519
D3 TRACK 2 - Build a Computer at Home - Hacker ..> 15-Oct-2019 11:00             5458104
D3 TRACK 2 - Decoupled Components for Automated..> 15-Oct-2019 11:00             3967819
D3 TRACK 2 - Hunting Threats in Social Media Ne..> 15-Oct-2019 11:00             7491625
D3 TRACK 2 - Practical Guide to Automotive Secu..> 15-Oct-2019 11:00             3648108
D4 HIGHLIGHT - The Impact of Blockchain and Cry..> 16-Oct-2019 10:50            13314692
D4 TRACK 1 - ABBE - Detecting Attacks In Ethere..> 16-Oct-2019 10:50             6798905
D4 TRACK 1 - Introducing ARM-X – The ARM IoT ..> 16-Oct-2019 10:51            18255192
D4 TRACK 2 - APT Attacks On Crypto Exchange Emp..> 16-Oct-2019 10:16             7698502
D4 TRACK 2 - Reimplementing Local RPC in .NET -..> 16-Oct-2019 10:52             1128988
D4 TRACK 3 - Introduction to WebKit Exploitatio..> 16-Oct-2019 10:16             8269510
D5 TRACK 1 - Reputation Systems Against Social ..> 17-Oct-2019 05:53             4709027
KEYNOTE 1 - Security is Unevenly Distributed - ..> 15-Oct-2019 11:12             3871973
KEYNOTE 2 - We Hacked the Planet - Now What - K..> 16-Oct-2019 10:49             2741888
KEYNOTE 3 - Hackers & Cyberwar - How Hacking Ha..> 17-Oct-2019 05:53            16925665