Index of /files/2013/GreHack_2013_proceedings-separate_files/3-accepted_papers
Name
Last modified
Size
Description
Parent Directory
-
3.9_Jeanne_and_Desplanques_-_Attacks_using_malicious_devices_:_a_way_to_protect_yourself_against_physical_access.pdf
2013-11-13 17:43
199K
3.8_Ando_-_Unraveling_large_scale_geographical_distribution_of_vulnerable_DNS_servers_using_asynchronous_IO_mechanism.pdf
2013-11-13 17:43
326K
3.7_Achara_-Detecting_Privacy_Leaks_in_the_RATP_App_how_we_proceeded_and_what_we_found.pdf
2013-11-13 17:43
2.3M
3.6_E_Leverett_and_Reid_Wightman_-_Vulnerability_Inheritance_in_Programmable_Logic_Controllers.pdf
2013-11-13 17:43
261K
3.5_Alejandro_Nolla_-_Amplification_DDoS_attacks_with_game_servers.pdf
2013-11-13 17:43
260K
3.4_Feist_-_Statically_Detecting_Use_After_Free_on_Binary_Code.pdf
2013-11-13 17:43
371K
3.3_Apvrille_-_Pre-filtering_Mobile_Malware_with_Heuristic_Techniques.pdf
2013-11-13 17:43
1.3M
3.2_Mathieu_Cunche_-_I_know_your_MAC_Address_Targeted_tracking_of_individual_using_Wi-Fi.pdf
2013-11-13 17:42
264K
3.1_Markku_Juhani_O_Saarinen-Developing_a_Grey_Hat_C2_and_RAT_for_APT_Security_Training_and_Assessment.pdf
2013-11-13 17:42
387K