×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
COMMSEC D1 - Sweety Chauhan - Data Driven Software Security.pdf
Home
/
Discover
/
gsec.hitb.org
/
materials
/
sg2016
/
Parent Folder
COMMSEC D1 - Sweety Chauhan - Data Driven Software Security.pdf
PDF
5 years ago
Get Size
Copy Link
COMMSEC D1 - Sanoop Thomas - Halcyon IDE.pdf
PDF
5 years ago
Get Size
Copy Link
COMMSEC D2 - Alfonso De Gregorio - A Code of Ethics for the Private Sector.pdf
PDF
5 years ago
Get Size
Copy Link
COMMSEC D2 - Florian Lukavsky - Fake Presidents Fraud Defrauded.pdf
PDF
5 years ago
Get Size
Copy Link
COMMSEC D1 - Michael Gianarakis - Reverse Engineering Swift Applications.pdf
PDF
5 years ago
1.99 MB
Copy Link
COMMSEC D2 - Paul Craig - Local Privilege Escalation in 2016.pdf
PDF
5 years ago
Get Size
Copy Link
COMMSEC D2 - Rajchada Chanajitt - Forensic Analysis and Assessment of Android Banking Apps.pdf
PDF
5 years ago
Get Size
Copy Link
COMMSEC D2 - Tan Kean Siong - IoT Honeypots.pdf
PDF
5 years ago
Get Size
Copy Link
COMMSEC D2 - Vanessa Henderson - Copy-paste Vulnerabilities.pdf
PDF
5 years ago
327.32 kB
Copy Link
D1 - Adam Donenfeld and Yaniv Mordekhay - Stumping The Mobile Chipset.pdf
PDF
5 years ago
4.11 MB
Copy Link
D1 - Bernhard Mueller - Attacking Software Tokens.pdf
PDF
5 years ago
43.93 MB
Copy Link
D1 - Jonathan Levin - The Apple Sandbox - Deeper into the Quagmire.pdf
PDF
5 years ago
1.78 MB
Copy Link
D1 - Moonbeom Park and Youngjun Park - Understanding Your Opponent Attack Profiling.pdf
PDF
5 years ago
1.47 MB
Copy Link
D1 - Nguyen Anh Quynh - Keystone - A Next Generation Assembler Framework.pdf
PDF
5 years ago
Get Size
Copy Link
D1 - Olga Kochetova and Alexey Osipov - ATMs and Their Dirty Little Secrets.pdf
PDF
5 years ago
1.93 MB
Copy Link
D1 - Peter Pi - Attacking NVIDIA's Tegra Platform.pdf
PDF
5 years ago
Get Size
Copy Link
D2 - Koh Yong Chuan - Fuzzing the Windows Kernel.pdf
PDF
5 years ago
2.01 MB
Copy Link
D2 - Matteo Beccaro and Matteo Collura - Abusing Smart Cities.pdf
PDF
5 years ago
18.59 MB
Copy Link
D2 - Moritz Jodeit -Look Mom I Don't Use Shellcode.pdf
PDF
5 years ago
Get Size
Copy Link
D2 - Shlomi Oberman and Ron Shina - Breaking Exploits with Practical Control Flow Integrity.pdf
PDF
5 years ago
3.79 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.