Index of /Conferences/DEF_CON_26_(2018)/Talks/DC_101

      Name                                                                                                          Last modified      Size  Description
Parent Directory - A_Journey_Into_Hexagon_Dissecting_a_Qualcomm_Baseband/ 2019-10-01 14:05 - An_Attacker_Looks_at_Docker_Approaching_Multi-Container_Applications/ 2019-10-01 13:54 - Automated_Discovery_of_Deserialization_Gadget_Chains/ 2019-10-01 14:00 - Betrayed_by_the_keyboard_How_what_you_type_can_give_you_away/ 2019-10-01 14:14 - Breaking_Smart_Speakers_We_are_Listening_to_You/ 2019-10-01 14:20 - Building_Absurd_Christmas_Light_Shows/ 2019-10-01 14:26 - Building_the_Hacker_Tracker/ 2019-10-01 14:29 - DC_101_PANEL/ 2019-10-01 14:40 - Dissecting_the_Teddy_Ruxpin_Reverse_Engineering_the_Smart_Bear/ 2019-10-01 14:43 - Hacking_PLCs_and_Causing_Havoc_on_Critical_Infrastructures/ 2019-10-01 14:49 - Having_fun_with_IoT_Reverse_Engineering_and_Hacking_of_Xiaomi_IoT_Devices/ 2019-10-01 14:56 - House_of_Roman_a_leakless_Heap_Fengshui_to_Achieve_RCE_on_PIE_Binaries/ 2019-10-01 14:59 - It's_Assembler_Jim_but_not_as_we_know_it_(ab)using_binaries_from_embedded_devices_for_fun_and_profit/ 2019-10-01 15:05 - One_Step_Ahead_of_Cheaters_Instrumenting_Android_Emulators/ 2019-10-01 15:08 - Outsmarting_the_Smart_City/ 2019-10-01 15:13 - Project_Interceptor_Avoiding_Counter-Drone_Systems_with_Nanodrones/ 2019-10-01 15:19 - Pwning_the_toughest_target_the_exploit_chain_of_winning_the_largest_bug_bounty_in_the_history_of_ASR_program/ 2019-10-01 15:21 - Ring_0_-2_Rootkits_Bypassing_Defenses/ 2019-10-01 15:26 - Searching_for_the_Light_Adventures_with_OpticSpy/ 2019-10-01 15:33 - Synfuzz_Building_a_Grammar_Based_Re-targetable_Test_Generation_Framework/ 2019-10-01 15:43 - The_Mouse_is_Mightier_than_the_Sword/ 2019-10-01 15:49 - ThinSIM-based_Attacks_on_Mobile_Money_Systems/ 2019-10-01 15:54 - Through_the_Eyes_of_the_Attacker_Designing_Embedded_Systems_Exploits_for_Industrial_Control_Systems/ 2019-10-01 16:02 - Trouble_in_the_tubes_How_internet_routing_security_breaks_down_and_how_you_can_do_it_at_home/ 2019-10-01 16:08 - UEFI_Exploitation_for_the_Masses/ 2019-10-01 16:15 - Wagging_The_Tail_-_Covert_Passive_Surveillance_And_How_To_Make_Their_Life_Difficult/ 2019-10-01 16:22 - Weaponizing_Unicode_Homographs_Beyond_IDNs/ 2019-10-01 16:32 - You_Can_Run_but_You_Can't_Hide_Reverse_Engineering_Using_X-Ray/ 2019-10-01 16:41 - Your_Bank's_Digital_Side_Door/ 2019-10-01 16:38 -