3. Engineering Cybersecurity for a Nation- What Singapore is Learning from Cars and Sanitation.mp4 | 244.25 MB |
40. Locknote- Conclusions and Key Takeaways from Day 2.mp4 | 219.62 MB |
15. Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities.mp4 | 216.9 MB |
37. Adversary Detection Pipelines- Finally Making Your Threat Intel Useful.mp4 | 169.97 MB |
7. What the Log-! So Many Events, so Little Time.mp4 | 159.39 MB |
39. Locknote- Conclusions and Key Takeaways from Day 1.mp4 | 158.53 MB |
18. Biometrics & Privacy- Time to Faceoff or is that FaceApp-.mp4 | 151.65 MB |
22. Store-to-Leak Forwarding- There and Back Again.mp4 | 135.38 MB |
1. BitLeaker- Subverting BitLocker with One Vulnerability.mp4 | 130.47 MB |
26. Page Cache Attacks- Microarchitectural Attacks on Flawless Hardware.mp4 | 125.74 MB |
13. The Evil Alt-Ego- (ab)using HTTP Alternative Services.mp4 | 123.87 MB |
2. Complexity Killed Security.mp4 | 121.99 MB |
24. Back to the Future. Cross-Protocol Attacks in the Era of 5G.mp4 | 119.52 MB |
4. The Black Hat NOC- Greatest Hits and Holy...Cows.mp4 | 119.42 MB |
32. Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community.mp4 | 116.54 MB |
16. CDPwn- Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days.mp4 | 111.5 MB |
31. Hey Google, Activate Spyware! – When Google Assistant Uses a Vulnerability as a Feature.mp4 | 104.95 MB |
29. Kr00k- How KRACKing Amazon Echo Exposed a Billion+ Vulnerable Wi-Fi Devices.mp4 | 101.52 MB |
23. ZombieLoad- Leaking Data on Intel CPUs.mp4 | 98.67 MB |
5. Escaping Virtualized Containers.mp4 | 98.17 MB |
30. From an URGENT11 Vulnerability to a Full Take-Down of a Factory Using a Single Packet.mp4 | 97.45 MB |
11. Raiden Glitching Framework.mp4 | 97.33 MB |
14. The Evil of Spy Camera.mp4 | 94.24 MB |
21. Redback- Advanced Static Binary Injection.mp4 | 93.5 MB |
12. First Contact - Vulnerabilities in Contactless Payments.mp4 | 93.31 MB |
27. Wi-Fi Brokering.mp4 | 91.72 MB |
38. Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation.mp4 | 87.35 MB |
9. Misuse of DNS, the Second Most Used Protocol.mp4 | 85.27 MB |
20. Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale.mp4 | 85.1 MB |
10. Faking a Factory- Creating and Operating a Realistic Honeypot.mp4 | 83.94 MB |
25. 3d Red Pill- A Guest-to-Host Escape on QEMUKVM Virtio Device.mp4 | 79.29 MB |
8. Securing the Next Version of HTTP- How QUIC and HTTP3 Compare to HTTP2.mp4 | 72.85 MB |
28. May the Trust be with You- Empowering TrustZone-M with Multiple Trusted Environments.mp4 | 69.87 MB |
17. WIFI-Important Remote Attack Surface- Threat is Expanding.mp4 | 64.25 MB |
33. Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier.mp4 | 59.17 MB |
36. The Inside Story- There are Apps in Apps and Here is How to Break Them.mp4 | 55.79 MB |
34. Win the 0-Day Racing Game Against Botnet in Public Cloud.mp4 | 54.99 MB |
35. Tracking the Criminal of Fake News Based on a Unified Embedding.mp4 | 54.77 MB |
19. Attacking and Defending Machine Learning Applications of Public Cloud.mp4 | 51.11 MB |
6. Patching Loopholes- Finding Backdoors in Applications.mp4 | 46.21 MB |