Showing 65 results

25:15
Travel & Eventsresearch-presentationhybridwindows

37:13
Travel & Eventsresearch-presentationhybridjava

39:40
Travel & Eventsresearch-presentationhybridmuslim-cyber-army

19:30
Travel & Eventsresearch-presentationtechnical-deep-diveethereum

24:13
Travel & Eventsresearch-presentationhybridblack-hat

45:07
Remote Exploitation of Nissan Leaf: Controlling Critical Body Elements from the Internet
Black Hat
5 months ago
Travel & Eventsresearch-presentationtechnical-deep-diveautomotive

30:13
Unveiling New Attack Vectors in Bluetooth Vulnerability Discovery through Protocol State Machine
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridbluetooth

29:01
Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridmime

40:55
Travel & Eventsresearch-presentationhybridmicrosoft-excel

21:03
Travel & Eventsresearch-presentationhybridai

27:44
Travel & Eventsresearch-presentationhybridcdn

30:49
KernelSnitch: Leaking Kernel Heap Pointers by Exploiting Software-Induced Side-Channel Leakage
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridlinux

43:13
A Closer Look at the Gaps in the Grid: New Vulnerabilities and Exploits Affecting Solar Power
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridsolar-power

36:36
Travel & Eventsresearch-presentationhybridwasm

42:04
Travel & Eventsresearch-presentationhybridrfid