Showing 49 results

37:13
Travel & Eventsresearch-presentationhybridjava

39:40
Travel & Eventsresearch-presentationhybridmuslim-cyber-army

38:56
Travel & Eventseducationalhybridblack-hat

24:13
Travel & Eventsresearch-presentationhybridblack-hat

19:30
Travel & Eventsresearch-presentationtechnical-deep-diveethereum

45:07
Remote Exploitation of Nissan Leaf: Controlling Critical Body Elements from the Internet
Black Hat
5 months ago
Travel & Eventsresearch-presentationtechnical-deep-diveautomotive

30:13
Unveiling New Attack Vectors in Bluetooth Vulnerability Discovery through Protocol State Machine
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridbluetooth

29:01
Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridmime

21:03
Travel & Eventsresearch-presentationhybridai

40:55
Travel & Eventsresearch-presentationhybridmicrosoft-excel

30:49
KernelSnitch: Leaking Kernel Heap Pointers by Exploiting Software-Induced Side-Channel Leakage
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridlinux

27:44
Travel & Eventsresearch-presentationhybridcdn

36:36
Travel & Eventsresearch-presentationhybridwasm

43:13
A Closer Look at the Gaps in the Grid: New Vulnerabilities and Exploits Affecting Solar Power
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridsolar-power
