Showing 10 results

37:50
Science & Technologyresearch-presentationhybridpgp

37:13
Travel & Eventsresearch-presentationhybridjava

45:07
Remote Exploitation of Nissan Leaf: Controlling Critical Body Elements from the Internet
Black Hat
5 months ago
Travel & Eventsresearch-presentationtechnical-deep-diveautomotive

30:13
Unveiling New Attack Vectors in Bluetooth Vulnerability Discovery through Protocol State Machine
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridbluetooth

40:55
Travel & Eventsresearch-presentationhybridmicrosoft-excel

30:49
KernelSnitch: Leaking Kernel Heap Pointers by Exploiting Software-Induced Side-Channel Leakage
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridlinux

32:28
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridlinux-kernel

35:56
The Illusion of Isolation: How Isolation Failures in CI/CD Servers Lead to RCE and Privacy Risks
Black Hat
6 months ago
Travel & Eventsresearch-presentationtechnical-deep-diveci-cd

47:09
The Oversights Under the Flow: Discovering the Vulnerable Tooling Suites From Azure MLOps
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridazure

30:24
Travel & Eventsresearch-presentationtechnical-deep-divevcenter