CODE BLUE 2016 (10 18-21 2016)/[CB16] Facebook Malware Tag Me If You Can by Ido Naor & Dani Goland.mp4 | 331.18 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] House of Einherjar — Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.mp4 | 215.6 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] Be a Binary Rockstar by Sophia DAntoine.mp4 | 184.84 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.mp4 | 132.75 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici..mp4 | 130.36 MB |
CODE BLUE 2013/CodeBlue01 Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.mp4 | 115.69 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.mp4 | 109.62 MB |
CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 Keren Elazari - Keynote The 5 biggest problems of cyber security.mp4 | 101.34 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] Keynote Digital Society e-Estonia by Anna Piperal.mp4 | 100.39 MB |
CODE BLUE 2013/CodeBlue01 Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.mp4 | 99.69 MB |
CODE BLUE 2013/CodeBlue01 Keynote - CODE BLUE in the ICU by Jeff Moss.mp4 | 99.23 MB |
CODE BLUE 2015 (2015 10 28-29)/Practical network defense at scale by Travis Carelock - CODE BLUE 2015.mp4 | 98.51 MB |
CODE BLUE 2013/CodeBlue01 o-checker - Malicious document file detection tool by Yuuhei Ootsubo.mp4 | 98.37 MB |
CODE BLUE 2015 (2015 10 28-29)/Is there an EFI monster inside your apple by Pedro Vilaca - CODE BLUE 2015.mp4 | 98.07 MB |
CODE BLUE 2015 (2015 10 28-29)/An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015.mp4 | 97.73 MB |
CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 Takahiro Matsuki & Dennis Kengo Oka.mp4 | 94.15 MB |
CODE BLUE 2013/CodeBlue01 The Current State of Automotive Security by Chris Valasek.mp4 | 93.23 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] Keynote How much security is too much by Karsten Nohl.mp4 | 93.01 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.mp4 | 91.88 MB |
CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 Dongcheol Hong - Drone attack by malware and network hacking.mp4 | 91.88 MB |
CODE BLUE 2013/CodeBlue01 Fight Against Citadel in Japan by You Nakatsuru.mp4 | 89.73 MB |
CODE BLUE 2013/CodeBlue01 A Security Barrier Device Regardless of OS or Applications by Kenji Toda.mp4 | 89.35 MB |
CODE BLUE 2015 (2015 10 28-29)/(In)Security of Medical Devices by Florian Grunow - CODE BLUE 2015.mp4 | 88.88 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] Who put the backdoor in my modem by Ewerson Guimaraes.mp4 | 88.87 MB |
CODE BLUE 2015 (2015 10 28-29)/The Only Way to Tell the Truth is in Fiction by Richard Thieme - CODE BLUE 2015.mp4 | 88.87 MB |
CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 Ben Schmidt & Paul Makowski- Embedded Security in The Land of the Rising Sun.mp4 | 86.55 MB |
CODE BLUE 2015 (2015 10 28-29)/Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015.mp4 | 83.55 MB |
CODE BLUE 2015 (2015 10 28-29)/How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim - CODE BLUE 2015.mp4 | 80.17 MB |
CODE BLUE 2015 (2015 10 28-29)/Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura - CODE BLUE 2015.mp4 | 78.78 MB |
CODE BLUE 2017 (11 8-10, 2017)/[CB17] National Security and Public-Private Partnership for Cybersecurity Strengths and Challenges.mp4 | 77.91 MB |
CODE BLUE 2015 (2015 10 28-29)/New immune system of information security from CHINA by Xiaodun Fang - CODE BLUE 2015.mp4 | 77.2 MB |
CODE BLUE 2015 (2015 10 28-29)/Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik - CODE BLUE 2015.mp4 | 77.05 MB |
CODE BLUE 2015 (2015 10 28-29)/Making and Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio - CODE BLUE 2015.mp4 | 76.94 MB |
CODE BLUE 2013/CodeBlue01 various tricks for remote linux exploits by Seokha Lee (wh1ant).mp4 | 76.92 MB |
CODE BLUE 2015 (2015 10 28-29)/Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio - CODE BLUE 2015.mp4 | 76.24 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] Esoteric Web Application Vulnerabilities by Andres Riancho.mp4 | 71.61 MB |
CODE BLUE 2013/CodeBlue01 Intel Management Engine Secrets by Igor Skochinsky.mp4 | 71.6 MB |
CODE BLUE 2017 (11 8-10, 2017)/[CB17] LG vs. Samsung Smart TV Which Is Better for Tracking You by Sangmin Lee.mp4 | 70.94 MB |
CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 The active use and exploitation of Microsoft s Application Compatibility Framework.mp4 | 69.53 MB |
CODE BLUE 2017 (11 8-10, 2017)/[CB17] George Hotz - Keynote Make your car self-driving using open-source software.mp4 | 68.26 MB |
CODE BLUE 2017 (11 8-10, 2017)/[CB17] Ory Segal - Passive Fingerprinting of HTTP 2 Clients..mp4 | 67.29 MB |
CODE BLUE 2017 (11 8-10, 2017)/[CB17] 吉村 孝広, 吉村 賢哉 - Trueseeing Effective Dataflow Analysis over Dalvik Opcodes.mp4 | 66.96 MB |
CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 Kuniyasu Suzaki - DeviceDisEnabler.mp4 | 66.53 MB |
CODE BLUE 2015 (2015 10 28-29)/Keynote The Singularity is Near by Takuya Matsuda - CODE BLUE 2015.mp4 | 65.2 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.mp4 | 64.81 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] COFI break by Ron Shina & Shlomi Oberman.mp4 | 63.97 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] About CGC the world’s first all-machine hacking tournament by Tyler Nighswander.mp4 | 63.88 MB |
CODE BLUE 2017 (11 8-10, 2017)/[CB17] Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.mp4 | 62.6 MB |
CODE BLUE 2013/CodeBlue01 Preventing hard disk firmware manipulation attack and disaster recovery.mp4 | 62.2 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] WireGuard Next Generation Abuse-Resistant Kernel Network Tunnelby Jason Donenfeld.mp4 | 61.7 MB |