Index of /Conferences/DEF_CON_31_(2023)/Talks/Track_4

      Name                                                                                                                             Last modified      Size  Description
Parent Directory - Azure_B2C_0-Day_An_Exploit_Chain_from_Public_Keys_to_Microsoft_Bug_Bounty/ 2024-10-04 22:44 - A_Broken_Marriage_Abusing_Mixed_Vendor_Kerberos_Stacks/ 2024-10-04 22:46 - Defeating_VPN_Always_On/ 2024-10-04 22:55 - Defender-Pretender_When_Windows_Defender_Updates_Become_a_Security_Risk/ 2024-10-04 22:58 - Fireside_Chat_with_the_National_Cyber_Director/ 2024-10-04 23:05 - From_Feature_to_Weapon_Breaking_Microsoft_Teams_and_SharePoint_Integrity/ 2024-10-04 23:05 - Game_Changing_Advances_in_Windows_Shellcode_Analysis/ 2024-10-04 23:08 - Growing_the_Community_of_AI_Hackers_with_the_Generative_Red_Team/ 2024-10-04 23:12 - Hacker_Court_Interactive_Scenario/ 2024-10-04 23:15 - Hack_the_Future_Why_Congress_and_the_White_House_are_supporting_AI_Red_Teaming/ 2024-10-04 23:21 - Lions_and_Tigers_and_Fancy_Bears_Oh_My_A_Cautionary_Tale_for_our_Cyber_Future/ 2024-10-04 23:25 - LLMs_at_the_Forefront_Pioneering_the_Future_of_Fuzz_Testing_in_a_Rapidly_Changing_World/ 2024-10-04 23:28 - Look_Ma_I'm_the_CEO_Real_Time_Video_and_Audio_Deep_Fake/ 2024-10-04 23:32 - Malware_design_-_abusing_legacy_Microsoft_transports_and_session_architecture/ 2024-10-04 23:34 - Power_Corrupts_Corrupt_It_Back_Hacking_Power_Management_in_Data_Centers/ 2024-10-04 23:37 - Private_Until_Presumed_Guilty/ 2024-10-04 23:41 - Revolutionizing_ELF_binary_patching_with_Shiva_A_JIT_binary_patching_system_for_Linux/ 2024-10-04 23:45 - Route_to_bugs_Analyzing_the_security_of_BGP_message_parsing/ 2024-10-04 23:48 - Second_Breakfast_Implicit_and_Mutation_Based_Serialization_Vulnerabilities_in_.NET/ 2024-10-04 23:51 - Spread_spectrum_techniques_in_disposable_drones_for_anti_drone_evasion/ 2024-10-04 23:54 - Vacuum_robot_security_and_privacy_-_prevent_your_robot_from_sucking_your_data/ 2024-10-04 23:57 - All_information_looks_like_noise_until_you_break_the_code_Futureproofing_the_transportation_sector/ 2024-10-06 22:09 - Burrowing_Through_The_Network_Contextualizing_The_Vulkan_Leaks_and_Historical_State_Sponsored_Offensive_Operations/ 2024-10-06 22:10 - Civil_Cyber_Defense_Use_Your_Resources_to_Defend_Non_Profits_as_they_Combat_Human_Trafficking_and_Subvert_Authoritarian_Regimes/ 2024-10-06 22:11 - Exploring_Linux_Memory_Manipulation_for_Stealth_and_Evasion_Strategies_to_bypass_Read_Only_No_Exec_and_Distroless_Environments/ 2024-10-06 22:11 -