![[ ]](http://gsec.hitb.org/icons/layout.gif)
| COMMSEC D1 - Michael Gianarakis - Reverse Engineering Swift Applications.pdf | 2016-08-25 10:02 | 2.0M | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| COMMSEC D1 - Sanoop Thomas - Halcyon IDE.pdf | 2016-08-25 10:02 | 501K | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| COMMSEC D1 - Sweety Chauhan - Data Driven Software Security.pdf | 2016-08-25 08:39 | 1.4M | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| COMMSEC D2 - Alfonso De Gregorio - A Code of Ethics for the Private Sector.pdf | 2016-08-26 09:46 | 17M | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| COMMSEC D2 - Florian Lukavsky - Fake Presidents Fraud Defrauded.pdf | 2016-08-26 09:37 | 1.5M | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| COMMSEC D2 - Paul Craig - Local Privilege Escalation in 2016.pdf | 2016-08-27 09:10 | 2.9M | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| COMMSEC D2 - Rajchada Chanajitt - Forensic Analysis and Assessment of Android Banking Apps.pdf | 2016-08-29 05:06 | 24M | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| COMMSEC D2 - Tan Kean Siong - IoT Honeypots.pdf | 2016-08-26 10:57 | 5.0M | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| COMMSEC D2 - Vanessa Henderson - Copy-paste Vulnerabilities.pdf | 2016-08-26 08:26 | 327K | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| D1 - Adam Donenfeld and Yaniv Mordekhay - Stumping The Mobile Chipset.pdf | 2016-08-26 05:30 | 4.1M | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| D1 - Bernhard Mueller - Attacking Software Tokens.pdf | 2016-08-25 08:30 | 44M | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| D1 - Jonathan Levin - The Apple Sandbox - Deeper into the Quagmire.pdf | 2016-08-25 10:05 | 1.8M | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| D1 - Moonbeom Park and Youngjun Park - Understanding Your Opponent Attack Profiling.pdf | 2016-08-25 07:45 | 1.5M | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| D1 - Nguyen Anh Quynh - Keystone - A Next Generation Assembler Framework.pdf | 2016-08-25 11:28 | 1.8M | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| D1 - Olga Kochetova and Alexey Osipov - ATMs and Their Dirty Little Secrets.pdf | 2016-08-25 12:02 | 1.9M | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| D1 - Peter Pi - Attacking NVIDIA's Tegra Platform.pdf | 2016-08-25 07:48 | 726K | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| D2 - Koh Yong Chuan - Fuzzing the Windows Kernel.pdf | 2016-08-26 05:18 | 2.0M | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| D2 - Matteo Beccaro and Matteo Collura - Abusing Smart Cities.pdf | 2016-08-26 06:16 | 19M | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| D2 - Moritz Jodeit -Look Mom I Don't Use Shellcode.pdf | 2016-08-26 11:11 | 2.0M | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| D2 - Shlomi Oberman and Ron Shina - Breaking Exploits with Practical Control Flow Integrity.pdf | 2016-08-26 08:39 | 3.8M | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| D2 - Stefan Esser - iOS 10 Kernel Heap Revisited.pdf | 2016-08-26 10:57 | 3.6M | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| KEYNOTE 1 - Erin Jacobs - I Fight For the Users .pdf | 2016-08-25 03:50 | 61M | |
![[ ]](http://gsec.hitb.org/icons/layout.gif)
| KEYNOTE 2 - Katie Moussouris - Hacking the Pentagon - Bounty Creation Lessons - NO SLIDES.pdf | 2016-08-26 05:20 | 0 |