BlackHat Europe 2020
4.04 GB
Filelist:
1. From Zero to Sixty – The Story of No…uperpower.mp4
2. Finding Bugs Compiler Knows but Does…s in LLVM.mp4
3. Cross-Site Escape – Pwning macOS Saf…usual Way.mp4
4. Permission Mining in GCP.mp4
5. Debug Resurrection on Nordic nRF52 Series.mp4
6. Please Make a Dentist Appointment AS… Commands.mp4
7. Bypassing NGAV for Fun and Profit.mp4
8. Manufacturing Hardware Implants from…s Journey.mp4
9. How to Better Fuzz Windows 10 Direct…t Present.mp4
10. This is for the Pwners – Exploitin…Station 4.mp4
11. Portable Data exFiltration – XSS for PDFs.mp4
12. The Hunt for Major League IoT-ICS T…t Terrain.mp4
13. How the Security Features in TLS In…iltration.mp4
14. IAM Concerned – OAuth Token Hijacki…oud (GCP).mp4
15. Graph Convolutional Network-Based S…l Control.mp4
16. Shield with Hole – New Security Mit…r Privacy.mp4
17. Jack-in-the-Cache – A New Code inje…ion Cache.mp4
18. LadderLeak – Breaking ECDSA with Le…e Leakage.mp4
19. FPs are Cheap. Show me the CVEs!.mp4
20. BinTyper – Type Confusion Detection… Binaries.mp4
21. Discovering 20 Year Old Vulnerabili…ws Kernel.mp4
22. POSWorld. Should You be Afraid of H…t Devices.mp4
23. Fingerprint-Jacking – Practical Fin…roid Apps.mp4
24. Story of Jailbreaking iOS 13.mp4
25. The Subtle Art of Chaining Headers …ase Study.mp4
26. Design Pitfalls in Commercial Mini-…d and iOS.mp4
27. efiXplorer – Hunting for UEFI Firmw… Analysis.mp4
28. Quantum Security and Cryptography -… it Wrong.mp4
29. Effective Vulnerability Discovery w… Learning.mp4
30. It’s not FINished – The Evolving Ma…perations.mp4
31. How Embedded TCP_IP Stacks Breed Cr…abilities.mp4
32. My Ticks Don’t Lie – New Timing Att…Detection.mp4
33. Hermes Attack – Steal DNN Models In…Scenarios.mp4
34. A New Hope – The One Last Chance to… SSD Data.mp4
35. Light Commands – Hacking Voice Assi…th Lasers.mp4
36. Precursor – Towards Evidence-Based … Hardware.mp4
37. Hacking Government Cybersecurity.mp4
Reviews
There are no reviews yet.