Γ
All
Videos π¬
Audios π΅
eBooks π
Mobile Apps π±
Archives (ZIP/ISO) πΏ
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
D1 COMMSEC - How to Detect Fake Faces (Manipulated Images) Using CNNs - J. Xiong, T. Wei, H. Xin, W. Yang, D. Goodman.pdf
Home
/
Discover
/
gsec.hitb.org
/
materials
/
sg2019
/
Parent Folder
D1 COMMSEC - How to Detect Fake Faces (Manipulated Images) Using CNNs - J. Xiong, T. Wei, H. Xin, W. Yang, D. Goodman.pdf
PDF
5 years ago
Get Size
Copy Link
D1 COMMSEC - Hacking Object Detectors Is Just Like Training Neural Networks - J. Xiong, T. Wei, H. Xin, W. Yang, D. Goodman.pdf
PDF
5 years ago
Get Size
Copy Link
D1 COMMSEC - Security Should Be Smarter, Not Harder - Katie Moussouris.pdf
PDF
5 years ago
4.98 MB
Copy Link
D1 COMMSEC - Compendium Vulnus Subestimata - Underrated Security Bugs - Eldar Marcussen.pdf
PDF
5 years ago
Get Size
Copy Link
D1 COMMSEC - Tick Group - Activities Of The Tick Cyber Espionage Group In East Asia Over The Last 10 Years - Cha Minseok.pdf
PDF
5 years ago
Get Size
Copy Link
D1 COMMSEC - Car Hacking Made Easel By Car Security Quarter (CSQ) - Alina Tan, Chun Yong, Tan Pei Si & Solomon Tan.pdf
PDF
5 years ago
2.55 MB
Copy Link
D1 COMMSEC - Zero to RCE in Two Days - Exploiting Zoom On macOS - Michael Gianarakis & Sean Yeoh.pdf
PDF
5 years ago
Get Size
Copy Link
D1 - Why You Should Fear Your Mundane Office Equipment - Mario Rivas & Daniel Romero.pdf
PDF
5 years ago
4.65 MB
Copy Link
D1 KEYNOTE - The CISOs Dilemma - Saumil Shah.pdf
PDF
5 years ago
Get Size
Copy Link
D1 - What Species of Fish Is This - Malware Classification with Graph Hash - Chia Ching Fang & Shih-Hao Weng.pdf
PDF
5 years ago
Get Size
Copy Link
D1 - Understanding, Attacking & Securing Medical Devices - Ajay Pratap Singh.pdf
PDF
5 years ago
7.49 MB
Copy Link
D2 - 4G LTE Man in the Middle Attacks with a Hacked Femtocell - Xiaodong Zou.pdf
PDF
5 years ago
Get Size
Copy Link
D1 - Static Code Analysis Recognition Evasion - Andreas Wiegenstein.pdf
PDF
5 years ago
Get Size
Copy Link
D2 - Bypassing a Hardware-Based Trusted Boot Through x86 CPU Microcode Downgrade - Alexander Ermolov.pdf
PDF
5 years ago
Get Size
Copy Link
D2 - Creating a Fuzzer for Diameter and LTE Telecom Protocols - Sergey Mashukov.pdf
PDF
5 years ago
Get Size
Copy Link
D1 - Infiltrating Corporate Intranets Like The NSA - A Pre-Auth Remote Code Execution on Leading SSL VPNs - Orange Tsai & Tingyi Chan.pdf
PDF
5 years ago
Get Size
Copy Link
D1 - Advanced Mutation Fuzzing Method For Wireless Protocols - Lidong Li & Xianzi Kong.pdf
PDF
5 years ago
43.10 MB
Copy Link
D2 - Launching Feedback-Driven Fuzzing on TrustZone TEE - Andrey Akimov.pdf
PDF
5 years ago
2.38 MB
Copy Link
D1 - 4G to 5G - New Attacks - Altaf Shaik.pdf
PDF
5 years ago
Get Size
Copy Link
D2 - Recreating an iOS 0day Jailbreak Out of Appleβs Security Updates - Stefan Esser.pdf
PDF
5 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.