• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • HITB2022SIN
  • HITB2021SIN
  • HITB2019GSec
  • HITB2018GSec
  • HITB2017GSec
  • HITB2016GSec
Edition logo

Hack In The Box - GSec HITB2019GSec

2019-08-29 - 2019-08-30
  • Thumbnail for the video - click to play

    ►

    The CISO's Dilemma
    - Saumil Shah
  • Thumbnail for the video - click to play

    ►

    Scare: Static Code Analysis Recognition Evasion
    - Andreas Wiegenstein
  • Thumbnail for the video - click to play

    ►

    Zero To RCE In Two Days: Exploiting Zoom On MacOS
    - Michael Gianarakis and Sean Yeoh
  • Thumbnail for the video - click to play

    ►

    Why You Should Fear Your "Mundane" Office Equipment
    - Mario Rivas and Daniel Romero
  • Thumbnail for the video - click to play

    ►

    Tick Tock - Activities Of The Tick Cyber Espionage Group In East Asia Over The Last 10 Years
    - Cha Minseok
  • Thumbnail for the video - click to play

    ►

    4G To 5G: New Attacks
    - Altaf Shaik
  • Thumbnail for the video - click to play

    ►

    Compendium Vulnus Subestimata: Underrated Security Bugs
    - Eldar "Wireghoul" Marcussen
  • Thumbnail for the video - click to play

    ►

    Car Hacking Made "Easel" By Car Security Quarter (CSQ)
    - Alina Tan,Chun Yong,Tan Pei Si and Solomon Tan
  • Thumbnail for the video - click to play

    ►

    Advanced Mutation Fuzzing Method For Wireless Protocols
    - Lidong Li and Xianzi Kong
  • Thumbnail for the video - click to play

    ►

    Hacking Object Detectors Is Just Like Training Neural Networks
    - Jay Xiong,Tao Wei,Hao Xin,Wang Yang and Dou Goodman
  • Thumbnail for the video - click to play

    ►

    Security Should Be Smarter Not Harder
    - Katie Moussouris
  • Thumbnail for the video - click to play

    ►

    What Species Of Fish Is This? Malware Classification With Graph Hash
    - Chia-Ching Fang and Shih-Hao Weng
  • Thumbnail for the video - click to play

    ►

    How To Detect Fake Faces (Manipulated Images) Using CNNs
    - Wang Yang,Tao Wei,Dou Goodman,Jay Xiong and Hao Xin
  • Thumbnail for the video - click to play

    ►

    Understanding, Attacking & Securing Medical Devices
    - Ajay Pratap Singh
  • Thumbnail for the video - click to play

    ►

    Infiltrating Corporate Intranets Like The NSA: A Pre-Auth RCE On Leading SSL VPNs
    - Orange Tsai and Tingyi Chang
  • Thumbnail for the video - click to play

    ►

    Never Gonna Give You Up, Never Gonna Let You Down
    - Marc Rogers
  • Thumbnail for the video - click to play

    ►

    Tracking Fake News Based On Deep Learning
    - Zonghou Lv,Tao Wei and Dou Goodman
  • Thumbnail for the video - click to play

    ►

    Bypassing Hardware-Based Trusted Boot Through x86 CPU Microcode Downgrade
    - Alexander Ermolov
  • Thumbnail for the video - click to play

    ►

    Perfidious: Make PE Backdooring Great Again!
    - Shreyans Doshi
  • Thumbnail for the video - click to play

    ►

    DFEx - DNS File Exfiltration
    - Emilio Couto
  • Thumbnail for the video - click to play

    ►

    Creating A Fuzzer For Diameter And LTE Telecom Protocols
    - Sergey Mashukov
  • Thumbnail for the video - click to play

    ►

    Abusing Over-The-Air Client Provisioning: My SMS To Do Your Settings
    - Slava Makkaveev and Artyom Skrobov
  • Thumbnail for the video - click to play

    ►

    4G LTE Man In The Middle Attacks With A Hacked Femtocell
    - Xiaodong Zou
  • Thumbnail for the video - click to play

    ►

    The Future Is Here: Modern Automotive Attack Surfaces
    - Lior Yaari and Yonatan Migdal
  • Thumbnail for the video - click to play

    ►

    Launching Feedback-Driven Fuzzing On TrustZone TEE
    - Andrey Akimov
  • Thumbnail for the video - click to play

    ►

    Physical To Cyber And Back: Fingerprint Scanner Security
    - Kevin Reed
  • Thumbnail for the video - click to play

    ►

    Recreating An iOS 0-Day Jailbreak Out Of Apple's Security Updates
    - Stefan Esser
  • Thumbnail for the video - click to play

    ►

    Securing Cyber-Physical Systems: Moving Beyond Fear
    - Stefano Zanero
  • Thumbnail for the video - click to play

    ►

    Prize Ceremony / Closing Note / Lock Note
    - Dhillon 'L33tdawg' Kannabhiran