Index of /Conferences/DEF_CON_32_(2024)/Talks/Track_4
Name Last modified Size Description
Parent Directory -
Unlocking_the_Gates_Hacking_a_secure_Industrial_Remote_Access_Solution/ 2024-10-12 18:21 -
The_Way_To_Android_Root_Exploiting_Your_GPU_On_Smartphone/ 2024-10-12 18:18 -
Techniques_for_Creating_Process_Injection_Attacks_with_Advanced_Return_Oriented_Programming/ 2024-10-12 18:17 -
SHIM_me_what_you_got_Manipulating_Shim_and_Office_for_Code_Injection/ 2024-10-12 18:14 -
Securing_CCTV_Cameras_Against_Blind_Spots/ 2024-10-12 18:13 -
Secrets_and_Shadows_Leveraging_Big_Data_for_Vulnerability_Discovery_at_Scale/ 2024-10-12 18:10 -
Reverse_Engineering_MicroPython_Frozen_Modules_Data_Structures_Reconstruction_and_Reading_Bytecode/ 2024-10-12 18:08 -
Redefining_V2G_How_to_use_your_vehicle_as_a_game_controller/ 2024-10-12 18:06 -
Outlook_Unleashing_RCE_Chaos_CVE_2024_30103/ 2024-10-12 18:03 -
Open_Sesame_or_how_vulnerable_is_your_stuff_in_electronic_lockers/ 2024-10-12 18:01 -
OH_MY_DC_Abusing_OIDC_all_the_way_to_your_cloud/ 2024-10-12 18:00 -
Nano_Enigma_Uncovering_the_Secrets_Within_eFuse_Memories/ 2024-10-12 17:57 -
Measuring_the_Tor_Network/ 2024-10-12 17:55 -
Incubated_Machine_Learning_Exploits_Backdooring_ML_Pipelines_Using_Input_Handling_Bugs/ 2024-10-12 17:54 -
High_Intensity_Deconstruction_Chronicles_of_a_Cryptographic_Heist/ 2024-10-12 17:49 -
Grand_Theft_Actions_Abusing_Self_Hosted_GitHub_Runners_at_Scale/ 2024-10-12 17:47 -
Discovering_and_exploiting_local_attacks_against_the_1Password_MacOS_desktop_application/ 2024-10-12 17:47 -
DEF_CON_Franklin_Project/ 2024-10-12 17:45 -
Defeating_magic_by_magic_Using_ALPC_security_features_to_compromise_RPC_services/ 2024-10-12 17:43 -
Defeating_EDR_Evading_Malware_with_Memory_Forensics/ 2024-10-12 17:40 -
Changing_Global_Threat_Landscape_with_Rob_Joyce_and_The_Dark_Tangent/ 2024-10-12 17:36 -
Breaking_Secure_Web_Gateways_SWG_for_Fun_and_Profit/ 2024-10-12 17:32 -
Android_App_Usage_and_Cell_Tower_Location_Private_Sensitive_Available_to_Anyone/ 2024-10-12 17:29 -