2022-08-20 | CLOSING KEYNOTE Securing Cyber Physical Systems Moving Beyond Fear Stefano Zanero | 0:00 | 25 | |
|
2022-08-20 | COMMSEC Modern Automotive Attack Surfaces Lior Yaari and Yonatan Migdal | 0:00 | 19 | |
|
2022-08-20 | COMMSEC Abusing Over The Air Client Provisioning Slava Makkaveev and Artyom Skrobov | 0:00 | 25 | |
|
2022-08-20 | COMMSEC Activities Of The Tick Cyber Espionage Group Over The Last 10 Years Cha Minseok | 0:00 | 8 | |
|
2022-08-20 | COMMSEC Perfidious Make PE Backdooring Great Again Shreyans Doshi | 0:00 | 5 | |
|
2022-08-20 | COMMSEC Physical To Cyber And Back Fingerprint Scanner Security Kevin Reed | 0:00 | 5 | |
|
2022-08-20 | COMMSEC Tracking Fake News Based On Deep Learning Zonghou Lv,Tao Wei and Dou Goodman | 0:00 | 4 | |
|
2022-08-20 | COMMSEC Underrated Security Bugs Eldar Wireghoul Marcussen | 0:00 | 7 | |
|
2022-08-20 | Creating A Fuzzer For Diameter And LTE Telecom Protocols Sergey Mashukov | 0:00 | 25 | |
|
2022-08-20 | KEYNOTE D2 Never Gonna Give You Up, Never Gonna Let You Down Marc Rogers | 0:00 | 1 | |
|
2022-08-20 | KEYNOTE The CISO's Dilemma Saumil Shah | 0:00 | 11 | |
|
2022-08-20 | Launching Feedback Driven Fuzzing On TrustZone TEE Andrey Akimov | 0:00 | 21 | |
|
2022-08-18 | A Successful Mess Between Hardening And Mitigation Weichselbaum & Spagnuolo | 0:00 | 11 | |
|
2022-08-18 | Hacking LTE Public Warning Systems Weiguang Li | 0:00 | 41 | |
|
2022-08-18 | Hacking The 0day Market Andrea Zapparoli Manzoni | 0:00 | 26 | |
|
2022-08-18 | Hidden Agendas Bypassing GSMA Recommendations On SS7 Networks Kirill Puzankov | 0:00 | 55 | |
|
2022-08-18 | Attacking Encrypted VOIP Protocols Ivica Stipovic | 0:00 | 16 | |
|
2022-08-18 | Attacking GSM Alarms, Smart Homes, Smart Watches And More Alex Kolchanov | 0:00 | 15 | |
|
2022-08-18 | Hourglass Fuzz A Quick Bug Hunting Method M Li, T Han, L Jiang and L Wu | 0:00 | 7 | |
|
2022-08-18 | Attacking Industrial Remote Controllers Marco Balduzzi and Federico Maggi | 0:00 | 5 | |
|
2022-08-18 | How To Dump, Parse, And Analyze i MX Flash Memory Chips Damien Cauquil | 0:00 | 54 | |
|
2022-08-18 | I Own Your Building Management System Gjoko Krstic | 0:00 | 61 | |
|
2022-08-18 | Automated Discovery Of Logical Priv Esc Bugs In Win10 Wenxu Wu and Shi Qin | 0:00 | 7 | |
|
2022-08-18 | Improving Unicode Attacks With Deep Learning Muñoz, Boza & Escribano | 0:00 | 8 | |
|
2022-08-18 | KEYNOTE 2 Securing Journalists Runa Sandvik | 0:00 | 14 | |
|
2022-08-18 | Binder The Bridge To Root Hongli Han and Mingjian Zhou | 0:00 | 5 | |
|
2022-08-18 | Closing Ceremony & CTF Prize Giving Ceremony | 0:00 | 0 | |
|
2022-08-18 | LOCKNOTE HITBCyberWeek Announcement Dhillon 'L33tdawg' Kannabhiran | 0:00 | 0 | |
|
2022-08-18 | Make ARM Shellcode Great Again Saumil Shah | 0:00 | 17 | |
|
2022-08-18 | Compiler Bugs And Bug Compilers Marion Marschalek | 0:00 | 13 | |
|
2022-08-18 | Demystifying IoT OT Hacks With SDR Harshit Agrawal & Himanshu Mehta | 0:00 | 8 | |
|
2022-08-18 | Might As Well JUMP Exploit Development For Java Serialization Jameel Nabbo | 0:00 | 14 | |
|
2022-08-18 | Deobfuscate UEFI BIOS Malware And Virtualized Packers Alexandre Borges | 0:00 | 48 | |
|
2022-08-18 | ModJack Hijacking The MacOS Kernel Zhi Zhou | 0:00 | 62 | |
|
2022-08-18 | Duplicating Black Box Machine Learning Models Rewanth Cool and Nikhil Joshi | 0:00 | 6 | |
|
2022-08-18 | Muraena The Unexpected Phish Michele Orru and Giuseppe Trotta | 0:00 | 225 | |
|
2022-08-18 | Finding Vulnerabilities In iOS MacOS Networking Code Kevin Backhouse | 0:00 | 15 | |
|
2022-08-18 | fn fuzzy Fast Multiple Binary Diffing Triage With IDA Takahiro Haruyama | 0:00 | 22 | |
|
2022-08-18 | Overcoming Fear Reversing With Radare2 Arnau Gamez Montolio | 0:00 | 54 | |
|
2022-08-18 | For The Win The Art Of The Windows Kernel Fuzzing Guangming Liu | 0:00 | 17 | |
|
2022-08-18 | HackDMI Pwning HDMI For Fun And Profit Jeonghoon Shin and Changhyeon Moon | 0:00 | 15 | |
|
2022-08-18 | Multidimensional HW Attack And Defense Toolset K Chai, Jie Fu & Mingchuang Qin | 0:00 | 10 | |
|
2022-08-18 | Spanish Fly Infecting Files On The Fly Leonardo Nve | 0:00 | 12 | |
|
2022-08-18 | Gold Digging Discovering Hidden Gems In APKs Marc Schoenefeld | 0:00 | 8 | |
|
2022-08-18 | System level Threats Assumptions In Modern Product Security Cristofaro Mune | 0:00 | 9 | |
|
2022-08-18 | The Phantom Menace Intel ME Manufacturing Mode Maxim Goryachy and Mark Ermolov | 0:00 | 42 | |
|
2022-08-18 | Hacking Into Broadband And Broadcast TV Systems C Kasmi, P Barre and T Sabono | 0:00 | 17 | |
|
2022-08-18 | Hacking Telephone Systems For Fun & Profit Himanshu Mehta and Sachin Wagh | 0:00 | 12 | |
|
2022-08-18 | Using Machine Learning To Investigate Web Campaigns At Large Federico Maggi | 0:00 | 3 | |
|
2022-08-18 | Hacking The International RFQ Process killthebuzzwords Dino Covotsos | 0:00 | 9 | |
|
2022-08-18 | Virtualizing IoT With Code Coverage Guided Fuzzing KJ Lau and Nguyen Anh Quynh | 0:00 | 11 | |
|
2022-08-18 | COMMSEC RedPhishing Wi Fi, Phishing And Red Teaming Matteo Beccaro | 0:00 | 17 | |
|
2022-08-18 | LOCK NOTE Philippe Viola | 0:00 | 1 | |
|
2022-08-18 | Viewer Discretion Advised DeCoding An iOS Vulnerability Adam Donenfeld | 0:00 | 35 | |
|
2022-08-18 | A First Look Into The Security Of The Apple Pencil And Smartkeyboard S Esser | 0:00 | 7 | |
|
2022-08-18 | COMMSEC SayaKenaHack Breach Notification In Malaysia Keith Rozario | 0:00 | 6 | |
|
2022-08-18 | COMMSEC Securing ICS SCADA Defense In Depth Mike Rebultan | 0:00 | 11 | |
|
2022-08-18 | NFC Payments The Art Of Relay And Replay Attacks Salvador Mendoza | 0:00 | 1,282 | |
|
2022-08-18 | COMMSEC Software Security Era Past, Present, And Future Nafiez and Jaan Yeh | 0:00 | 0 | |
|
2022-08-18 | A Year Of Purple Ryan Shepherd | 0:00 | 1 | |
|
2022-08-18 | COMMSEC Surprise Rant 2 0 Joernchen | 0:00 | 5 | |
|
2022-08-18 | Owning Electronic Locks Without Leaving A Trace Tomi Tuominen and Timo Hirvonen | 0:00 | 14 | |
|
2022-08-18 | COMMSEC The Trails Of WINDSHIFT APT Taha Karim | 0:00 | 27 | |
|
2022-08-18 | CLOSING KEYNOTE Rethinking The Cyber Kill Chain Alexis Lavi | 0:00 | 24 | |
|
2022-08-18 | Panel Discussion Zero Seconds To Midnight The 0 day Market | 0:00 | 5 | |
|
2022-08-18 | COMMSEC Blockchain And Smart Contract Attack Vectors Jorden Seet | 0:00 | 27 | |
|
2022-08-18 | COMMSEC Threat Impact Analyser For IoT Simon Eng and Lim Eng Woei | 0:00 | 3 | |
|
2022-08-18 | COMMSEC Breaking Full Disk Encryption Nicolas Collery and Vitaly Kamluk | 0:00 | 14 | |
|
2022-08-18 | COMMSEC Using ML To Identify Security Issues In Open Source Libraries A Sharma | 0:00 | 2 | |
|
2022-08-18 | The Road To iOS Sandbox Escape Rani Idan | 0:00 | 31 | | The Sandbox
|
2022-08-18 | COMMSEC Welcome Address Andrea Zapparoli Manzoni | 0:00 | 4 | |
|
2022-08-18 | COMMSEC Closing Remarks Andrea Zapparoli Manzoni | 0:00 | 2 | |
|
2022-08-18 | Exploiting Automation In LTE Mobile Networks R Borgaonkar and A Shaik | 0:00 | 6 | |
|
2022-08-18 | COMMSEC Cognitive Automation With Machine Learning In Cybersecurity Rishi Kant | 0:00 | 1 | |
|
2022-08-18 | Traversing The Kill Chain The New Shiny In 2018 Vincent Yiu | 0:00 | 7 | |
|
2022-08-18 | COMMSEC Demystifying The Definitions Of Dark Fadli B Sidek | 0:00 | 9 | |
|
2022-08-18 | File Structures Another Binary Exploitation Technique An Jie Yang Angelboy | 0:00 | 33 | |
|
2022-08-18 | COMMSEC Generic And Static Detection Of Mobile Malware Using ML Minh Tran | 0:00 | 6 | |
|
2022-08-18 | God Mode Unlocked Hardware Backdoors In x86 CPUs Christopher Domas | 0:00 | 406 | |
|
2022-08-18 | COMMSEC Hacking Mobile Games Closing The Gap Nicholas Lim | 0:00 | 1 | |
|
2022-08-18 | COMMSEC Internet Of Things Battle Of The Bots Rommel D Joven | 0:00 | 6 | |
|
2022-08-18 | Hacking BLE Bicycle Locks For Fun And A Small Profit Vincent Tan | 0:00 | 49 | |
|
2022-08-18 | COMMSEC KLara Your New Friend Dan Demeter | 0:00 | 0 | |
|
2022-08-18 | KEYNOTE 1 InSecurity Is Eating The World Michael Coates | 0:00 | 5 | |
|
2022-08-18 | COMMSEC Learning How To Smurf With Honeypots Emil Tan | 0:00 | 10 | |
|
2022-08-18 | KEYNOTE 2 OK Computer Machine Learning In Cybersecurity Alexander Polyakov | 0:00 | 3 | |
|
2022-08-18 | COMMSEC Monitoring Native Execution In WoW64 Apps Y Shafir and A Carlsbad | 0:00 | 9 | |
|
2022-08-18 | Horror On The Bus Hacking COMBUS Kirils Solovjovs | 0:00 | 9 | |
|
2022-08-18 | Vote Of No Confidence Second Factor Correctness Victor Mateu | 0:00 | 5 | |
|
2022-08-18 | Welcome Address H E Yousuf Hamad Al Shaibani | 0:00 | 3 | |
|
2022-08-18 | NTLM Relay Is Dead, Long Live NTLM Relay Jianing Wang and Junyu Zhou | 0:00 | 12 | |
|
2022-08-18 | Hunting For Backdoors In IoT Firmware At Unprecedented Scale John Toterhi | 0:00 | 16 | |
|
2022-08-18 | HWallet The Simple Cryptocurrency Hardware Wallet Nemanja Nikodijevic | 0:00 | 4 | |
|
2022-08-18 | Offensive Memory Forensics Hugo Teso | 0:00 | 12 | |
|
2022-08-18 | Improved Blockchain Infrastructure With IoT Dr Qassim Nasir and Dr Manar Abu Talib | 0:00 | 7 | |
|
2022-08-18 | Intrusion Detection On The HW Bus Congyuan Xu,Wang Kang and Yang Bo | 0:00 | 4 | |
|
2022-08-18 | Rooting Routers Using Symbolic Execution Mathy Vanhoef | 0:00 | 8 | |
|
2022-08-18 | IPv666 Address Of The Beast Marc Newlin and Chris Grayson | 0:00 | 11 | |
|
2022-08-18 | KEYNOTE 1 Crouching Tiger, Sudden Keynote Katie Moussouris | 0:00 | 7 | |
|
2022-08-18 | KEYNOTE 2 Cyber Arms Race Mikko Hypponen 2 | 0:00 | 34 | |
|