Index of /Conferences/DEF_CON_32_(2024)/Villages/AppSec_Village
Name Last modified Size Description
Parent Directory -
0_0_0_0_Day_Exploiting_Localhost_APIs_From_The_Browser/ 2024-10-12 19:23 -
BOLABuster_Harnessing_LLMs_for_Automating_BOLA_Detection/ 2024-10-12 19:26 -
Engineers_and_Exploits_The_Quest_for_Security/ 2024-10-12 19:27 -
Fine_Grained_Authorisation_with_Relationship_Based_Access_Control/ 2024-10-12 19:29 -
Gridlock_The_Dual_Edged_Sword_of_EV_and_Solar_APIs_in_Grid_Security/ 2024-10-12 19:29 -
Hacking_Corporate_Banking_for_Fun_and_Profit/ 2024-10-12 19:30 -
I've_got_99_problems_but_a_prompt_injection_ain't_watermelon/ 2024-10-12 19:32 -
Maturing_Your_Application_Security_Program/ 2024-10-12 19:34 -
Navigating_the_Cyber_Security_Labyrinth_Choose_Your_Own_Security_Adventure/ 2024-10-12 19:36 -
Relative_Path_File_Injection_The_Next_Evolution_in_RPO/ 2024-10-12 19:38 -
SDLC_Nightmares_Defeating_Secure_Code_Review_GPT_Hallucinations/ 2024-10-12 19:40 -
Securing_Frontends_at_Scale_Paving_our_Way_to_the_Post_XSS_World/ 2024-10-12 19:41 -
Speed_Bumps_and_Speed_Hacks_Adventures_in_Car_Manufacturers_Security/ 2024-10-12 19:44 -
The_Darkest_Side_of_Bug_Bounty/ 2024-10-12 19:46 -
The_Immortal_Retrofuturism_of_Mainframe_Computers_and_How_to_Keep_Them_Safe/ 2024-10-12 19:48 -
The_Missing_Link_How_we_collect_and_leverage_SBOMs/ 2024-10-12 19:50 -
Threat_Modeling_in_the_Age_of_AI/ 2024-10-12 19:52 -
Ticking_SQLi/ 2024-10-12 19:54 -
Transforming_AppSec_Protecting_Everything_as_Code_and_Emerging_Tech/ 2024-10-12 19:56 -
Unlocking_the_Gates_Understanding_Authentication_Bypass_Vulnerabilities/ 2024-10-12 19:59 -
Using_EPSS_for_Better_Management_Vulnerability_Management/ 2024-10-12 20:01 -
Web2_Meets_Web3_Hacking_Decentralized_Applications/ 2024-10-12 20:02 -
When_Chatbots_Go_Rogue_Lessons_Learned_from_Building_and_Defending_LLM_Applications/ 2024-10-12 20:04 -
Winning_big_AppSec_Considerations_From_the_Casino_Industry/ 2024-10-12 20:06 -
Your_CI_CD_Pipeline_Is_Vulnerable_But_It's_Not_Your_Fault/ 2024-10-12 20:07 -