×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
CONF SLIDES AND PAPER
Home
/
Discover
/
178.17.170.13
/
CONF SLIDES AND PAPER
/
Parent Folder
us-15-Cassidy-Switches-Get-Stitches.pdf
PDF
2 years ago
4.15 MB
Copy Link
us-15-Conti-Pen-Testing-A-City-wp.pdf
PDF
2 years ago
541.56 kB
Copy Link
us-15-Conti-Pen-Testing-A-City.pdf
PDF
2 years ago
42.76 MB
Copy Link
us-15-Cui-Emanate-Like-A-Boss-Generalized-Covert-Data-Exfiltration-With-Funtenna.pdf
PDF
2 years ago
25.93 MB
Copy Link
us-15-Dalman-Commercial-Spyware-Detecting-The-Undetectable-wp.pdf
PDF
2 years ago
1.34 MB
Copy Link
us-15-Dalman-Commercial-Spyware-Detecting-The-Undetectable.pdf
PDF
2 years ago
2.02 MB
Copy Link
us-15-Domas-The-Memory-Sinkhole-Unleashing-An-x86-Design-Flaw-Allowing-Universal-Privilege-Escalation-wp.pdf
PDF
2 years ago
208.79 kB
Copy Link
us-15-Domas-The-Memory-Sinkhole-Unleashing-An-x86-Design-Flaw-Allowing-Universal-Privilege-Escalation.pdf
PDF
2 years ago
16.30 MB
Copy Link
us-15-Domas-TheMemorySinkhole.pdf
PDF
2 years ago
28.49 kB
Copy Link
us-15-Drake-Stagefright-Scary-Code-In-The-Heart-Of-Android.pdf
PDF
2 years ago
1.33 MB
Copy Link
us-15-Fillmore-Crash-Pay-How-To-Own-And-Clone-Contactless-Payment-Devices-wp.pdf
PDF
2 years ago
301.80 kB
Copy Link
us-15-Fillmore-Crash-Pay-How-To-Own-And-Clone-Contactless-Payment-Devices.pdf
PDF
2 years ago
1.68 MB
Copy Link
us-15-Gaddam-Securing-Your-Big-Data-Environment.pdf
PDF
2 years ago
1.09 MB
Copy Link
us-15-Gavrichenkov-Breaking-HTTPS-With-BGP-Hijacking-wp.pdf
PDF
2 years ago
133.33 kB
Copy Link
us-15-Gavrichenkov-Breaking-HTTPS-With-BGP-Hijacking.pdf
PDF
2 years ago
281.21 kB
Copy Link
us-15-Gong-Fuzzing-Android-System-Services-By-Binder-Call-To-Escalate-Privilege-wp.pdf
PDF
2 years ago
717.10 kB
Copy Link
us-15-Gong-Fuzzing-Android-System-Services-By-Binder-Call-To-Escalate-Privilege.pdf
PDF
2 years ago
1.18 MB
Copy Link
us-15-Graeber-Abusing-Windows-Management-Instrumentation-WMI-To-Build-A-Persistent Asynchronous-And-Fileless-Backdoor-wp.pdf
PDF
2 years ago
1.01 MB
Copy Link
us-15-Kettle-Server-Side-Template-Injection-RCE-For-The-Modern-Web-App-wp.pdf
PDF
2 years ago
1.75 MB
Copy Link
us-15-Kirda-Most-Ransomware-Isn’t-As-Complex-As-You-Might-Think-wp.pdf
PDF
2 years ago
793.45 kB
Copy Link
us-15-Kirda-Most-Ransomware-Isn’t-As-Complex-As-You-Might-Think.pdf
PDF
2 years ago
5.81 MB
Copy Link
us-15-Klick-Internet-Facing-PLCs-A-New-Back-Orifice-wp.pdf
PDF
2 years ago
878.96 kB
Copy Link
us-15-Kozy-Bringing-A-Cannon-To-A-Knife-Fight.pdf
PDF
2 years ago
14.16 MB
Copy Link
us-15-Krotofil-Rocking-The-Pocket-Book-Hacking-Chemical-Plant-For-Competition-And-Extortion-wp.pdf
PDF
2 years ago
9.86 MB
Copy Link
us-15-Krotofil-Rocking-The-Pocket-Book-Hacking-Chemical-Plant-For-Competition-And-Extortion.pdf
PDF
2 years ago
9.95 MB
Copy Link
us-15-Kruegel-Using-Static-Binary-Analysis-To-Find-Vulnerabilities-And-Backdoors-In-Firmware.pdf
PDF
2 years ago
28.11 MB
Copy Link
us-15-Larsen-Remote-Physical-Damage-101-Bread-And-Butter-Attacks.pdf
PDF
2 years ago
15.73 MB
Copy Link
us-15-Lei-Optimized-Fuzzing-IOKit-In-iOS-wp.pdf
PDF
2 years ago
634.09 kB
Copy Link
us-15-Lei-Optimized-Fuzzing-IOKit-In-iOS.pdf
PDF
2 years ago
2.09 MB
Copy Link
us-15-MarquisBoire-Big-Game-Hunting-The-Peculiarities-Of-Nation-State-Malware-Research.pdf
PDF
2 years ago
583.89 kB
Copy Link
us-15-Metcalf-Red-Vs-Blue-Modern-Active-Directory-Attacks-Detection-And-Protection-wp.pdf
PDF
2 years ago
1.40 MB
Copy Link
us-15-Metcalf-Red-Vs-Blue-Modern-Active-Directory-Attacks-Detection-And-Protection.pdf
PDF
2 years ago
2.73 MB
Copy Link
us-15-Moore-Defeating Pass-the-Hash-Separation-Of-Powers-wp.pdf
PDF
2 years ago
705.30 kB
Copy Link
us-15-Moore-Spread-Spectrum-Satcom-Hacking-Attacking-The-GlobalStar-Simplex-Data-Service-wp.pdf
PDF
2 years ago
203.18 kB
Copy Link
us-15-Moore-Spread-Spectrum-Satcom-Hacking-Attacking-The-GlobalStar-Simplex-Data-Service.pdf
PDF
2 years ago
4.27 MB
Copy Link
us-15-Morris-CrackLord-Maximizing-Password-Cracking-wp.pdf
PDF
2 years ago
272.10 kB
Copy Link
us-15-Morris-CrackLord-Maximizing-Password-Cracking.pdf
PDF
2 years ago
1.98 MB
Copy Link
us-15-Nafeez-Dom-Flow-Untangling-The-DOM-For-More-Easy-Juicy-Bugs.pdf
PDF
2 years ago
908.19 kB
Copy Link
us-15-Nguyen-Unicorn-Next-Generation-CPU-Emulator-Framework.pdf
PDF
2 years ago
750.11 kB
Copy Link
us-15-Ossmann-The-NSA-Playset-A-Year-Of-Toys-And-Tools.pdf
PDF
2 years ago
1.84 MB
Copy Link
us-15-Park-This-Is-DeepERENT-Tracking-App-Behaviors-With-Nothing-Changed-Phone-For-EvasiveAAndroid-Malware.pdf
PDF
2 years ago
1.73 MB
Copy Link
us-15-Peterson-GameOver-Zeus-Badguys-And-Backends-wp.pdf
PDF
2 years ago
1.19 MB
Copy Link
us-15-Peterson-GameOver-Zeus-Badguys-And-Backends.pdf
PDF
2 years ago
7.94 MB
Copy Link
us-15-Pickett-Staying-Persistent-In-Software-Defined-Networks-wp.pdf
PDF
2 years ago
189.08 kB
Copy Link
us-15-Pickett-Staying-Persistent-In-Software-Defined-Networks.pdf
PDF
2 years ago
1.95 MB
Copy Link
us-15-Pitts-Repurposing-OnionDuke-A-Single-Case-Study-Around-Reusing-Nation-State-Malware-wp.pdf
PDF
2 years ago
3.24 MB
Copy Link
us-15-Pitts-Repurposing-OnionDuke-A-Single-Case-Study-Around-Reusing-Nation-State-Malware.pdf
PDF
2 years ago
8.73 MB
Copy Link
us-15-Remes-Internet-Plumbing-For-Security-Professionals-The-State-Of-BGP-Security-wp.pdf
PDF
2 years ago
106.79 kB
Copy Link
us-15-Remes-Internet-Plumbing-For-Security-Professionals-The-State-Of-BGP-Security.pdf
PDF
2 years ago
1.11 MB
Copy Link
us-15-Seaborn-Exploiting-The-DRAM-Rowhammer-Bug-To-Gain-Kernel-Privileges.pdf
PDF
2 years ago
1.04 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.