hitbsecconf2024bkk

CLOSING KEYNOTE - The Modern Hacker – From Insight to Impact - Karsten Nohl.pdf

2024-09-03 03:44

3.3M

D1 COMMSEC - CoralRaider Targets Victims Data and Social Media Accounts - Joey Chen & Chetan Raghuprasad.pdf

2024-09-01 11:43

4.4M

D1 COMMSEC - Design and Development of a Multi-Tenant SIEM Using Security Onion - Wararit Hongkamnerd.pdf

2024-09-01 11:46

1.4M

D1 COMMSEC - Flash Loans- The Blessing or Curse of DeFi - Kritsada Dechawattana.pdf

2024-09-01 10:08

6.5M

D1 COMMSEC - How Automated Malware Attribution Engines Work - Anton Belousov.pdf

2024-09-01 10:07

12M

D1 COMMSEC - Leaking Kakao - How a Combination of Bugs in KakaoTalk Compromises User Privacy - Dawin Schmidt.pdf

2024-09-21 14:36

2.0M

D1 COMMSEC - My First and Last Shellcode Loader - Dobin Rutishauser.pdf

2024-09-01 11:47

4.5M

D1T1 - Dragon Slaying Guide - Bug Hunting In VMware Device Virtualization - Z. Li, H. Zheng, Y. Liu & J. Huang.pdf

2024-09-01 09:38

7.2M

D1T1 - Hunting Trojans with AST Transformers and Machine Learning - Stanislav Rakovsky.pdf

2024-09-01 09:41

5.7M

D1T1 - Secret Scanning in Open Source at Scale - Danish Tariq & Hassan Khan Yusufzai.pdf

2024-09-01 09:40

7.4M

D1T1 - Silencing Spies - Revealing Microphone Nonlinear Behavior and Building an Ultrasonic Jammer - Hetian Shi & Qing Wang.pdf

2024-09-01 09:39

14M

D2 COMMSEC - BadUSB Attacks on MacOS - Beyond Using the Terminal and Shell Commands - Nicolas Buzy Debat.pdf

2024-09-03 02:15

2.3M

D2 COMMSEC - Breaking Fake Voice Detection with Speaker-Irrelative Features - Xin Liu, Xuan Hai, Yuan Tan, & Song Li.pdf

2024-09-03 02:09

4.1M

D2 COMMSEC - Exploring Vulnerabilities in Flutter Mobile Apps Through Reverse Engineering - Sabina Llewellyn.pdf

2024-09-03 02:14

6.0M

D2 COMMSEC - TPMs and the Linux Kernel - A Better Path to Hardware Security - Ignat Korchagin.pdf

2024-09-03 02:13

4.5M

D2 COMMSEC - Words Have Meaning! Leveraging LLMs to Enhance Insider Threat Investigation Capabilities - Keggy the Keg.pdf

2024-09-03 02:29

10M

D2T1 - Discovering and Investigating Propagated Vulnerabilities from Ethereum to Its Layer-2 Blockchains - Daoyuan Wu & Ning Liu.pdf

2024-09-03 02:06

6.9M

D2T1 - Exploiting the In-Vehicle Browser - A Novel Attack Vector in Autonomous Vehicles - Ravi Rajput.pdf

2024-09-03 02:05

2.9M

D2T1 - Leveraging Request Smuggling For Authentication Bypass and Remote Code Execution - Adam Crosser.pdf

2024-09-03 02:04

13M

D2T1 - One SMS to Root Them All - Exposing Critical Threats in Millions of Connected Devices - Sergey Anufrienko & Alexander Kozlov.pdf

2024-09-03 02:07

10M

KEYNOTE 1 - The Modern CISO - Pepijn Kok.pdf

2024-09-01 09:36

11M