![[ICO]](/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](/icons/back.gif) | Parent Directory | | - | |
![[ ]](/icons/layout.gif) | 3.9_Jeanne_and_Desplanques_-_Attacks_using_malicious_devices_:_a_way_to_protect_yourself_against_physical_access.pdf | 2013-11-13 17:43 | 199K | |
![[ ]](/icons/layout.gif) | 3.5_Alejandro_Nolla_-_Amplification_DDoS_attacks_with_game_servers.pdf | 2013-11-13 17:43 | 260K | |
![[ ]](/icons/layout.gif) | 3.6_E_Leverett_and_Reid_Wightman_-_Vulnerability_Inheritance_in_Programmable_Logic_Controllers.pdf | 2013-11-13 17:43 | 261K | |
![[ ]](/icons/layout.gif) | 3.2_Mathieu_Cunche_-_I_know_your_MAC_Address_Targeted_tracking_of_individual_using_Wi-Fi.pdf | 2013-11-13 17:42 | 264K | |
![[ ]](/icons/layout.gif) | 3.8_Ando_-_Unraveling_large_scale_geographical_distribution_of_vulnerable_DNS_servers_using_asynchronous_IO_mechanism.pdf | 2013-11-13 17:43 | 326K | |
![[ ]](/icons/layout.gif) | 3.4_Feist_-_Statically_Detecting_Use_After_Free_on_Binary_Code.pdf | 2013-11-13 17:43 | 371K | |
![[ ]](/icons/layout.gif) | 3.1_Markku_Juhani_O_Saarinen-Developing_a_Grey_Hat_C2_and_RAT_for_APT_Security_Training_and_Assessment.pdf | 2013-11-13 17:42 | 387K | |
![[ ]](/icons/layout.gif) | 3.3_Apvrille_-_Pre-filtering_Mobile_Malware_with_Heuristic_Techniques.pdf | 2013-11-13 17:43 | 1.3M | |
![[ ]](/icons/layout.gif) | 3.7_Achara_-Detecting_Privacy_Leaks_in_the_RATP_App_how_we_proceeded_and_what_we_found.pdf | 2013-11-13 17:43 | 2.3M | |
|