Index of /files/2013/GreHack_2013_proceedings-separate_files/3-accepted_papers

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]3.1_Markku_Juhani_O_Saarinen-Developing_a_Grey_Hat_C2_and_RAT_for_APT_Security_Training_and_Assessment.pdf2013-11-13 17:42 387K 
[   ]3.2_Mathieu_Cunche_-_I_know_your_MAC_Address_Targeted_tracking_of_individual_using_Wi-Fi.pdf2013-11-13 17:42 264K 
[   ]3.3_Apvrille_-_Pre-filtering_Mobile_Malware_with_Heuristic_Techniques.pdf2013-11-13 17:43 1.3M 
[   ]3.4_Feist_-_Statically_Detecting_Use_After_Free_on_Binary_Code.pdf2013-11-13 17:43 371K 
[   ]3.5_Alejandro_Nolla_-_Amplification_DDoS_attacks_with_game_servers.pdf2013-11-13 17:43 260K 
[   ]3.6_E_Leverett_and_Reid_Wightman_-_Vulnerability_Inheritance_in_Programmable_Logic_Controllers.pdf2013-11-13 17:43 261K 
[   ]3.7_Achara_-Detecting_Privacy_Leaks_in_the_RATP_App_how_we_proceeded_and_what_we_found.pdf2013-11-13 17:43 2.3M 
[   ]3.8_Ando_-_Unraveling_large_scale_geographical_distribution_of_vulnerable_DNS_servers_using_asynchronous_IO_mechanism.pdf2013-11-13 17:43 326K 
[   ]3.9_Jeanne_and_Desplanques_-_Attacks_using_malicious_devices_:_a_way_to_protect_yourself_against_physical_access.pdf2013-11-13 17:43 199K