hitbgsec

#HITBGSEC COMMSEC: Hacking Object Detectors Is Just Like Training Neural Networks - Jay Xiong

#HITBGSEC COMMSEC: Car Hacking Made 'Easel' - Alina Tan, Chun Yong, Tan Pei Si and Solomon Tan

#HITBGSEC 2018 D1: A First Look Into The Security Of The Apple Pencil And Smartkeyboard - S. Esser

#HITBGSEC 2015 - Marc Heuse - Hiding in Complexity

#HITBGSEC 2017 CommSec D2 - 2FAssassin: Bypass 2FA, Stealing Private Keys, And More - Maxwell Koh

#HITBGSEC CLOSING KEYNOTE: Securing Cyber-Physical Systems: Moving Beyond Fear - Stefano Zanero

#HITBGSEC 2015 - Kristin Lovejoy - Keynote 1: Security vs Privacy

#HITBGSEC D1: Scare: Static Code Analysis Recognition Evasion - Andreas Wiegenstein

#HITBGSEC D1 KEYNOTE: The CISO's Dilemma - Saumil Shah

#HITBGSEC 2018 D2: NFC Payments: The Art Of Relay And Replay Attacks - Salvador Mendoza

#HITBGSEC 2016 SG KEYNOTE 2 - Hacking The Pentagon - Katie Moussouris

#HITBGSEC 2018 D1: File Structures: Another Binary Exploitation Technique - An-Jie Yang (Angelboy)

#HITBGSEC 2018 D1: Turning Memory Errors Into Code Execution With Client-Side Compilers - R. Gawlik

#HITBGSEC 2017 KEYNOTE 1 - Finding Vulns And Malware In Open Source Code At Scale - Mark Curphey

#HITBGSEC COMMSEC: Perfidious: Make PE Backdooring Great Again! - Shreyans Doshi

#HITBGSEC COMMSEC: Physical To Cyber And Back: Fingerprint Scanner Security - Kevin Reed

#HITBGSEC 2018 COMMSEC: Learning How To Smurf With Honeypots - Emil Tan

#HITBGSEC 2015 - Dmitry Chastuhin - SAP Afaria. One SMS To Hack A Company

#HITBGSEC 2018 D2: The Road To iOS Sandbox Escape - Rani Idan

#HITBGSEC COMMSEC BONUS: Security Should Be Smarter Not Harder - Katie Moussouris

#HITBGSEC 2018 COMMSEC: Blockchain And Smart Contract Attack Vectors - Jorden Seet

#HITBGSEC 2017 CLOSING KEYNOTE - A Spin Around The Block: 13 Years Of Infosec Challenges - Kelly Lum

#HITBGSEC 2018 KEYNOTE 1: (In)Security Is Eating The World - Michael Coates

#HITBGSEC 2017 Conf D1 - How We Broke Intel Amt - A. Ermolov, D. Evdokimov & M. Malyutin