![[ ]](http://conference.hitb.org/icons/layout.gif)
| D1 LABS - VoIP Attacking CUCM.pdf | 2014-06-19 23:44 | 2.7M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D1 SIGINT - Adnan Mohd Shukor - Fun With Javascript DeObfuscation.pdf | 2014-06-19 23:44 | 4.0M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D1 SIGINT - Jurre van Bergen and Youri van der Zwart - Abusing RFID.pdf | 2014-06-19 23:44 | 772K | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D1 SIGINT - Muhammad Najmi Ahmad Zabidi - Compiling Features for Malcious Binaries.pdf | 2014-06-19 23:44 | 410K | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D1T1 - Alex Kirk - Mobile Malware Analysis.pdf | 2014-06-19 23:44 | 1.8M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D1T1 - Andrea Barisani and Daniele Bianco - EMV Protocol and POS Physical Analysis.pdf | 2014-06-19 23:44 | 2.0M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D1T1 - Jonathan Brossard - Post Memory Corruption Analysis.pdf | 2014-06-19 23:44 | 278K | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D1T1 - Mahmud Ab Rahman - Reverse Engineering Android Malware.pdf | 2014-06-19 23:44 | 9.2M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D1T1 - Marco Balduzzi - Attacking the Privacy of Social Network Users.pdf | 2014-06-19 23:44 | 6.3M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D1T1 - Riley Hassell - Exploiting Androids for Fun and Profit.pdf | 2014-06-19 23:44 | 8.9M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D1T2 - Alexander Polyakov and Dimitry Chastuhin - SAPocalypse Now.pdf | 2014-06-19 23:44 | 15M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D1T2 - Don Bailey - GoodFUN - The GoodFET.pdf | 2014-06-19 23:44 | 968K | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D1T2 - Jim Geovedi - Satellite Telephony Security.pdf | 2014-06-19 23:44 | 5.4M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D1T2 - Laurent Weber - All your Base Stations Are Belong To Us.pdf | 2014-06-19 23:44 | 313K | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D1T2 - The Grugq - Smashing the Slack for Fun and Profit.pdf | 2014-06-19 23:44 | 14M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D1T2 - biatch0 and RuFI0 - Pwning a 4G Device for the LuLz.pdf | 2014-06-19 23:44 | 3.5M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D1T3 - Barry van Kampen - DIY Video Surveillance.pdf | 2014-06-19 23:44 | 894K | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D1T3 - Jimmy Shah - Mobile App Moolah.pdf | 2014-06-19 23:44 | 1.6M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D2 LABS - Daniel Mende and Jim Geovedi - Practical 3G-4G Attacks.pdf | 2014-06-19 23:44 | 2.2M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D2 SIGINT - Keith Lee - iPhone Espionage.pdf | 2014-06-19 23:44 | 4.9M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D2 SIGINT - Nur Muhammed Kamil - MyKotakPasir.pdf | 2014-06-19 23:44 | 1.1M | |
![[ ]](http://conference.hitb.org/icons/compressed.gif)
| D2T1 - Benjamin Kunz - Skype Zero Day Vulnerabilities.zip | 2014-06-19 23:44 | 48M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D2T1 - Hendrik Scholz - Air Travel Hacking.pdf | 2014-06-19 23:44 | 5.5M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D2T1 - Marc Blanchou and Mathew Solnik - Blackbox Android.pdf | 2014-06-19 23:44 | 3.6M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D2T1 - Ravi B Kevin R and Nico G - Femtocells.pdf | 2014-06-19 23:44 | 5.9M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D2T1 - Stefan Esser - iPhone Exploitation - One ROPe to Bind Them All.pdf | 2014-06-19 23:44 | 8.2M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D2T2 - KaiJern Lau - Malware Sandboxing the Xandora Way.pdf | 2014-06-19 23:44 | 15M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D2T2 - Paul Sebastian Ziegler - Stenographic AVI FIlesystems.pdf | 2014-06-19 23:44 | 2.9M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D2T2 - Philippe Langlois - Attacking the GPRS Roaming Exchange.pdf | 2014-06-19 23:44 | 13M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D2T2 - Saumil Shah - NO SLIDES.pdf | 2014-06-19 23:44 | 0 | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| D2T2 - Travis Goodspeed - Remotely Exploiting Layer One.pdf | 2014-06-19 23:44 | 311K | |
![[SND]](https://conference.hitb.org/icons/sound2.gif)
| HITB2011KUL - Post Conference Party Mix by Jim Geovedi.mp3 | 2014-06-19 23:44 | 183M | |
![[SND]](https://conference.hitb.org/icons/sound2.gif)
| HITB2011KUL - Post Conference Party Mix by Joernchen.mp3 | 2014-06-19 23:44 | 128M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| HackWEEKDAY - Arzumy.pdf | 2014-06-19 23:44 | 244K | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| HackWEEKDAY - sniffit.pdf | 2014-06-19 23:44 | 1.3M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| KEYNOTE 1 - Kenneth Geers - Is The Pen Still Mightier Than The Sword.pdf | 2014-06-19 23:44 | 1.5M | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| KEYNOTE 2 - Jennifer Granick - NO SLIDES.pdf | 2014-06-19 23:44 | 0 | |
![[ ]](http://conference.hitb.org/icons/layout.gif)
| KEYNOTE CLOSING - Richard Thieme - NO SLIDES.pdf | 2014-06-19 23:44 | 0 | |