×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
CONF SLIDES AND PAPER
Home
/
Discover
/
178.17.170.13
/
CONF SLIDES AND PAPER
/
Parent Folder
SSTIC2012-Miasm Framework de reverse engineering-slides.pdf
PDF
2 years ago
589.08 kB
Copy Link
SSTIC2014-BTA outil open-source d.analyse AD.pdf
PDF
2 years ago
636.62 kB
Copy Link
SSTIC2016-Article-how_to_not_break_lte_crypto-michau_devine.pdf
PDF
2 years ago
906.61 kB
Copy Link
asia-16-Bashan-Enterprise-Apps-Bypassing-The-iOS-Gatekeeper-wp.pdf
PDF
2 years ago
285.22 kB
Copy Link
asia-16-Bashan-Enterprise-Apps-Bypassing-The-iOS-Gatekeeper.pdf
PDF
2 years ago
3.91 MB
Copy Link
asia-16-Costin-Automated-Dynamic-Firmware-Analysis-At-Scale-A-Case-Study-On-Embedded-Web-Interfaces-wp.pdf
PDF
2 years ago
509.06 kB
Copy Link
asia-16-He-Hey-Your-Parcel-Looks-Bad-Fuzzing-And-Exploiting-Parcelization-Vulnerabilities-In-Android-wp.pdf
PDF
2 years ago
5.41 MB
Copy Link
asia-16-He-Hey-Your-Parcel-Looks-Bad-Fuzzing-And-Exploiting-Parcelization-Vulnerabilities-In-Android.pdf
PDF
2 years ago
2.09 MB
Copy Link
asia-16-Kazanciyan-DSCompromised-A-Windows-DSC-Attack-Framework.pdf
PDF
2 years ago
3.86 MB
Copy Link
asia-16-Marco-Gisbert-Exploiting-Linux-And-PaX-ASLRS-Weaknesses-On-32-And-64-Bit-Systems-wp.pdf
PDF
2 years ago
2.79 MB
Copy Link
asia-16-Marco-Gisbert-Exploiting-Linux-And-PaX-ASLRS-Weaknesses-On-32-And-64-Bit-Systems.pdf
PDF
2 years ago
2.10 MB
Copy Link
asia-16-Ossmann-Rapid-Radio-Reversing.pdf
PDF
2 years ago
2.07 MB
Copy Link
asia-16-Rubin-The-Perl-Jam-2-The-Camel-Strikes-Back.pdf
PDF
2 years ago
2.29 MB
Copy Link
asia-16-Saad-Android-Commercial-Spyware-Disease-And-Medication-wp.pdf
PDF
2 years ago
1.25 MB
Copy Link
asia-16-Zillner-Lets-See-Whats-Out-There-Mapping-The-Wireless-IOT.pdf
PDF
2 years ago
25.69 MB
Copy Link
eu-14-Hafif-Reflected-File-Download-a-New-Web-Attack-Vector-wp.pdf
PDF
2 years ago
1.55 MB
Copy Link
eu-14-Selvi-Bypassing-HTTP-Strict-Transport-Security-wp.pdf
PDF
2 years ago
284.90 kB
Copy Link
eu-15-Bai-Authenticator-Leakage-Through-Backup-Channels-On-Android.pdf
PDF
2 years ago
8.44 MB
Copy Link
eu-15-Balduzzi-Cybercrmine-In-The-Deep-Web-wp.pdf
PDF
2 years ago
3.16 MB
Copy Link
eu-15-Balduzzi-Cybercrmine-In-The-Deep-Web.pdf
PDF
2 years ago
8.10 MB
Copy Link
eu-15-Barresi-Silently-Breaking-ASLR-In-The-Cloud-wp.pdf
PDF
2 years ago
3.33 MB
Copy Link
eu-15-Barresi-Silently-Breaking-ASLR-In-The-Cloud.pdf
PDF
2 years ago
4.97 MB
Copy Link
eu-15-Benameur-All-Your-Root-Checks-Are-Belong-To-Us-The-Sad-State-Of-Root-Detection.pdf
PDF
2 years ago
544.20 kB
Copy Link
eu-15-Bettini-Vulnerability-Exploitation-In-Docker-Container-Environments-wp.pdf
PDF
2 years ago
3.74 MB
Copy Link
eu-15-Bettini-Vulnerability-Exploitation-In-Docker-Container-Environments.pdf
PDF
2 years ago
19.88 MB
Copy Link
eu-15-Blanda-Fuzzing-Android-A-Recipe-For-Uncovering-Vulnerabilities-Inside-System-Components-In-Android-wp.pdf
PDF
2 years ago
870.25 kB
Copy Link
eu-15-Borgaonkar-LTE-And-IMSI-Catcher-Myths-wp.pdf
PDF
2 years ago
2.60 MB
Copy Link
eu-15-Borgaonkar-LTE-And-IMSI-Catcher-Myths.pdf
PDF
2 years ago
4.11 MB
Copy Link
eu-15-Jarmoc-Going-AUTH-The-Rails-On-A-Crazy-Train-wp.pdf
PDF
2 years ago
2.17 MB
Copy Link
eu-15-Jarmoc-Going-AUTH-The-Rails-On-A-Crazy-Train.pdf
PDF
2 years ago
6.91 MB
Copy Link
eu-15-Kim-Triaging-Crashes-With-Backward-Taint-Analysis-For-ARM-Architecture.pdf
PDF
2 years ago
2.14 MB
Copy Link
eu-15-Lin-Androbugs-Framework-An-Android-Application-Security-Vulnerability-Scanner.pdf
PDF
2 years ago
5.34 MB
Copy Link
eu-15-Mayer-Faux-Disk-Encryption-Realities-Of-Secure-Storage-On-Mobile-Devices-wp.pdf
PDF
2 years ago
2.39 MB
Copy Link
eu-15-Mayer-Faux-Disk-Encryption-Realities-Of-Secure-Storage-On-Mobile-Devices.pdf
PDF
2 years ago
60.56 MB
Copy Link
eu-15-Mittal-Continuous-Intrusion-Why-CI-Tools-Are-An-Attackers-Best-Friend.pdf
PDF
2 years ago
6.22 MB
Copy Link
eu-15-Polyakov-Cybersecurity-For-Oil-And-Gas-Industries-How-Hackers-Can-Manipulate-Oil-Stocks-wp.pdf
PDF
2 years ago
1.66 MB
Copy Link
eu-15-Polyakov-Cybersecurity-For-Oil-And-Gas-Industries-How-Hackers-Can-Manipulate-Oil-Stocks.pdf
PDF
2 years ago
16.15 MB
Copy Link
eu-15-Shah-Stegosploit-Exploit-Delivery-With-Steganography-And-Polyglots.pdf
PDF
2 years ago
39.19 MB
Copy Link
eu-15-Somorovsky-How-To-Break-XML-Encryption-Automatically-wp.pdf
PDF
2 years ago
286.30 kB
Copy Link
eu-15-Somorovsky-How-To-Break-XML-Encryption-Automatically.pdf
PDF
2 years ago
2.91 MB
Copy Link
eu-15-Stasinopoulos-Commix-Detecting-And-Exploiting-Command-Injection-Flaws-wp.pdf
PDF
2 years ago
322.11 kB
Copy Link
eu-15-Stasinopoulos-Commix-Detecting-And-Exploiting-Command-Injection-Flaws.pdf
PDF
2 years ago
2.87 MB
Copy Link
eu-15-Todesco-Attacking-The-XNU-Kernal-In-El-Capitain.pdf
PDF
2 years ago
1.84 MB
Copy Link
eu-15-Vigo-Even-The-Lastpass-Will-Be-Stolen-deal-with-it.pdf
PDF
2 years ago
6.70 MB
Copy Link
us-15-Arnaboldi-Abusing-XSLT-For-Practical-Attacks-wp.pdf
PDF
2 years ago
1.98 MB
Copy Link
us-15-Arnaboldi-Abusing-XSLT-For-Practical-Attacks.pdf
PDF
2 years ago
13.55 MB
Copy Link
us-15-Bobrov-Certifi-Gate-Front-Door-Access-To-Pwning-Millions-Of-Androids-wp.pdf
PDF
2 years ago
581.41 kB
Copy Link
us-15-Bobrov-Certifi-Gate-Front-Door-Access-To-Pwning-Millions-Of-Androids.pdf
PDF
2 years ago
4.98 MB
Copy Link
us-15-Brossard-SMBv2-Sharing-More-Than-Just-Your-Files-wp.pdf
PDF
2 years ago
1.39 MB
Copy Link
us-15-Brossard-SMBv2-Sharing-More-Than-Just-Your-Files.pdf
PDF
2 years ago
3.72 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.