Γ
All
Videos π¬
Audios π΅
eBooks π
Mobile Apps π±
Archives (ZIP/ISO) πΏ
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
D2 - Bypassing a Hardware-Based Trusted Boot Through x86 CPU Microcode Downgrade - Alexander Ermolov.pdf
Home
/
Discover
/
gsec.hitb.org
/
materials
/
sg2019
/
Parent Folder
D2 - Bypassing a Hardware-Based Trusted Boot Through x86 CPU Microcode Downgrade - Alexander Ermolov.pdf
PDF
5 years ago
Get Size
Copy Link
D2 - Creating a Fuzzer for Diameter and LTE Telecom Protocols - Sergey Mashukov.pdf
PDF
5 years ago
Get Size
Copy Link
D2 - 4G LTE Man in the Middle Attacks with a Hacked Femtocell - Xiaodong Zou.pdf
PDF
5 years ago
Get Size
Copy Link
D2 - Launching Feedback-Driven Fuzzing on TrustZone TEE - Andrey Akimov.pdf
PDF
5 years ago
2.38 MB
Copy Link
D1 KEYNOTE - The CISOs Dilemma - Saumil Shah.pdf
PDF
5 years ago
Get Size
Copy Link
D1 COMMSEC - Zero to RCE in Two Days - Exploiting Zoom On macOS - Michael Gianarakis & Sean Yeoh.pdf
PDF
5 years ago
Get Size
Copy Link
D2 - Recreating an iOS 0day Jailbreak Out of Appleβs Security Updates - Stefan Esser.pdf
PDF
5 years ago
Get Size
Copy Link
D2 COMMSEC - Abusing Over-The-Air Client Provisioning - Slava Makkaveev & Artyom Skrobov.pdf
PDF
5 years ago
Get Size
Copy Link
D1 COMMSEC - Tick Group - Activities Of The Tick Cyber Espionage Group In East Asia Over The Last 10 Years - Cha Minseok.pdf
PDF
5 years ago
Get Size
Copy Link
D2 COMMSEC - DFEX β DNS File EXfiltration - Emilio Couto.pdf
PDF
5 years ago
Get Size
Copy Link
D1 COMMSEC - Security Should Be Smarter, Not Harder - Katie Moussouris.pdf
PDF
5 years ago
4.98 MB
Copy Link
D2 COMMSEC - PErfidious - Make PE Backdooring Great Again - Shreyans Doshi.pdf
PDF
5 years ago
Get Size
Copy Link
D1 COMMSEC - How to Detect Fake Faces (Manipulated Images) Using CNNs - J. Xiong, T. Wei, H. Xin, W. Yang, D. Goodman.pdf
PDF
5 years ago
Get Size
Copy Link
D1 COMMSEC - Hacking Object Detectors Is Just Like Training Neural Networks - J. Xiong, T. Wei, H. Xin, W. Yang, D. Goodman.pdf
PDF
5 years ago
Get Size
Copy Link
D2 COMMSEC - Physical To Cyber And Back - Fingerprint Scanner Security - Kevin Reed.pdf
PDF
5 years ago
Get Size
Copy Link
D1 COMMSEC - Compendium Vulnus Subestimata - Underrated Security Bugs - Eldar Marcussen.pdf
PDF
5 years ago
Get Size
Copy Link
D2 COMMSEC - The Future Is Here - Modern Automotive Attack Surfaces - Lior Yaari & Yonatan Migdal.pdf
PDF
5 years ago
Get Size
Copy Link
D1 COMMSEC - Car Hacking Made Easel By Car Security Quarter (CSQ) - Alina Tan, Chun Yong, Tan Pei Si & Solomon Tan.pdf
PDF
5 years ago
2.55 MB
Copy Link
D2 COMMSEC - Tracking Fake News Based On Deep Learning - T. Wei, Z. LV & D. Goodman.pdf
PDF
5 years ago
2.38 MB
Copy Link
D1 - Why You Should Fear Your Mundane Office Equipment - Mario Rivas & Daniel Romero.pdf
PDF
5 years ago
4.65 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.