-
Surveillance Is Not The Answer; What Is The Question?
- Jon Callas
-
HITB Studio - Jon Callas
- Dhillon,Sreeman and Jon Callas
-
JOP ROCKET: Bypassing DEP With Jump-Oriented Programming
- Bramwell Brizendine and Austin Babcock
-
Exploiting QSEE, The Raelize Way!
- Cristofaro Mune and Niek Timmers
-
HITB Studio - Cristofaro Mune and Niek Timmers
- Dhillon,Sreeman,Cristofaro Mune and Niek Timmers
-
HITB Studio - Bramwell Brizendine and Austin Babcock
- Dhillon,Sreeman,Bramwell Brizendine and Austin Babcock
-
Client-Side Attacks On Live-Streaming Services Using Grid Computing
- Seungmin Yoon,Suhwan Myeong,Sunhong Hwang,TaiSic Yun and Taiho Kim
-
X-In-The-Middle:
Attacking Fast Charging Electric Vehicles
- Wu HuiYu and YuXiang Li
-
POSWorld. Should You Be Afraid Of Hands-On Payment Devices?
- Timur Yunusov and Aleksei Stennikov
-
WoW Hell: Rebuilding Heavens Gate
- ShengHao Ma
-
HITB Studio - Crowdfense: Andrea Zapparoli Manzoni
- Dhillon,Sreeman and Andrea Zapparoli Manzoni
-
MacOS Local Security: Escaping The Sandbox And Bypassing TCC
- Thijs Alkemade and Daan Keuper
-
When Qiling Framework Meets Symbolic Execution
- Kaijern Lau,Kong ZiQiao and Wu ChenXu
-
HITB Studio - Edwin van Andel
- Dhillon,Sreeman and Edwin van Andel
-
HITB Studio - XWings
- Dhillon,Sreeman and XWings
-
Utilizing Lol-Drivers In Post Exploitation Tradecraft
- Bariş Akkaya
-
A Journey Into Synology NAS
- Q C
-
HITB Studio - itrainsec: Eco Carrera and Sergey Lozhkin
- Dhillon,Sreeman,Eco Carrera and Sergey Lozhkin
-
Shaping The Future Of The 0Day Market
- Andrea Zapparoli Manzoni
-
The History Of Adversarial AI
- Alex Polyakov and Eugene Neelou
-
Model Robustness Will Hurt Data Privacy?
- Jiqiang Gao and Mengyun Tang
-
Red Team Exercises For IoT Security
- Mars Cheng
-
One Stop Anomaly Shop
- Andrei Cotaie and Tiberiu Boros
-
Exploitation With Shell Reverse
And Infection With PowerShell
- Filipi Pires
-
The State Of Mobile Security
- Zuk Avraham
-
Mind The Bridge:
A New Attack Model For Hybird Mobile Applications
- Ce Qin
-
Hack Out Of The Box:
Discovering 10+ Vulnerabilities In VirtualBox
- Chen Nan
-
The Rise Of Potatoes:
Privilege Escalation In Windows Services
- Andrea Pierini and Antonio Cocomazzi
-
-
A QEMU Black Box Escape Via USB Device
- Lingni Kong,Yanyu Zhang and Haipeng Qu
-
Attacking Cloud Native Kubernetes With CDK
- Zebin Zhou and Yue Xu
-
HITB Studio - Panasonic: Sean Cheng and Cory Tseng
- Dhillon,Sreeman,Sean Cheng and Cory Tseng
-
HITB Studio - Yes We Hack: Kevin Gallerin
- Dhillon,Sreeman and Kevin Gallerin
-
The Phishermen:
Dissecting Phishing Techniques Of CloudDragon APT
- Linda Kuo and Zih-Cing Liao
-
Lightbranch: Binary Fuzzing With
Snapshot-Assisted-Driven Comparison Branches Analysis
- Kijong Son
-
How I Found 16 Microsoft Office Excel Vulnerabilities In 6 Months
- Quan Jin
-
Insecure Link: Security Analysis And Practical Attacks Of LPWAN
- YuXiang Li and Wu HuiYu
-
HITB Studio - Closing Note: Dhillon Kannabhiran
- Dhillon Kannabhiran
-
5G Networks And Interconnect Threats
- Martin Kacer
-
Semi-Automatic Code Deobfuscation
- Tim Blazytko
-
Breaking Siemens SIMATIC S7 PLC Protection Mechanism
- Gao Jian
-
AWS GuardDuty: Post-DNS Era Covert
Channel For C&C And Data Exfiltration
- Sze Siong Teo
-
JARM Randomizer: Evading JARM Fingerprinting
- Dagmawi Mulugeta