CODE BLUE 2016 (10 18-21 2016)/[CB16] Facebook Malware Tag Me If You Can by Ido Naor & Dani Goland.mp4 | 331.18 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] House of Einherjar — Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.mp4 | 215.6 MB |
CODE BLUE 2019/[CB19][BB] tknk_scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.mp4 | 187.43 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] Be a Binary Rockstar by Sophia DAntoine.mp4 | 184.84 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.mp4 | 132.75 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici..mp4 | 130.36 MB |
CODE BLUE 2013/CodeBlue01 Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.mp4 | 115.69 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.mp4 | 109.62 MB |
CODE BLUE 2018/[CB19][BB] CIRCO Cisco Implant Raspberry Controlled Operations by Emilio Couto.mp4 | 102.88 MB |
CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 Keren Elazari - Keynote The 5 biggest problems of cyber security.mp4 | 101.34 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] Keynote Digital Society e-Estonia by Anna Piperal.mp4 | 100.39 MB |
CODE BLUE 2013/CodeBlue01 Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.mp4 | 99.69 MB |
CODE BLUE 2013/CodeBlue01 Keynote - CODE BLUE in the ICU by Jeff Moss.mp4 | 99.23 MB |
CODE BLUE 2015 (2015 10 28-29)/Practical network defense at scale by Travis Carelock - CODE BLUE 2015.mp4 | 98.51 MB |
CODE BLUE 2013/CodeBlue01 o-checker - Malicious document file detection tool by Yuuhei Ootsubo.mp4 | 98.37 MB |
CODE BLUE 2015 (2015 10 28-29)/Is there an EFI monster inside your apple by Pedro Vilaca - CODE BLUE 2015.mp4 | 98.07 MB |
CODE BLUE 2015 (2015 10 28-29)/An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015.mp4 | 97.73 MB |
CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 Takahiro Matsuki & Dennis Kengo Oka.mp4 | 94.15 MB |
CODE BLUE 2013/CodeBlue01 The Current State of Automotive Security by Chris Valasek.mp4 | 93.23 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] Keynote How much security is too much by Karsten Nohl.mp4 | 93.01 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.mp4 | 91.88 MB |
CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 Dongcheol Hong - Drone attack by malware and network hacking.mp4 | 91.88 MB |
CODE BLUE 2013/CodeBlue01 Fight Against Citadel in Japan by You Nakatsuru.mp4 | 89.73 MB |
CODE BLUE 2013/CodeBlue01 A Security Barrier Device Regardless of OS or Applications by Kenji Toda.mp4 | 89.35 MB |
CODE BLUE 2015 (2015 10 28-29)/(In)Security of Medical Devices by Florian Grunow - CODE BLUE 2015.mp4 | 88.88 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] Who put the backdoor in my modem by Ewerson Guimaraes.mp4 | 88.87 MB |
CODE BLUE 2015 (2015 10 28-29)/The Only Way to Tell the Truth is in Fiction by Richard Thieme - CODE BLUE 2015.mp4 | 88.87 MB |
CODE BLUE 2018/[CB18] The Decalogue(ish) of Contractual Security Sins by Sebastian Avarvarei.mp4 | 88.63 MB |
CODE BLUE 2018/[CB18] A Dive in to Hyper-V Architecture & Vulnerabilities by Joe Bialek & Nicolas Joly.mp4 | 88.1 MB |
CODE BLUE 2018/[CB18] Keynote Cyber Arms Race by Mikko Hyppönen.mp4 | 87.46 MB |
CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 Ben Schmidt & Paul Makowski- Embedded Security in The Land of the Rising Sun.mp4 | 86.55 MB |
CODE BLUE 2015 (2015 10 28-29)/Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015.mp4 | 83.55 MB |
CODE BLUE 2019/[CB19][BB] Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.mp4 | 80.63 MB |
CODE BLUE 2015 (2015 10 28-29)/How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim - CODE BLUE 2015.mp4 | 80.17 MB |
CODE BLUE 2015 (2015 10 28-29)/Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura - CODE BLUE 2015.mp4 | 78.78 MB |
CODE BLUE 2017 (11 8-10, 2017)/[CB17] National Security and Public-Private Partnership for Cybersecurity Strengths and Challenges.mp4 | 77.91 MB |
CODE BLUE 2015 (2015 10 28-29)/New immune system of information security from CHINA by Xiaodun Fang - CODE BLUE 2015.mp4 | 77.2 MB |
CODE BLUE 2015 (2015 10 28-29)/Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik - CODE BLUE 2015.mp4 | 77.05 MB |
CODE BLUE 2015 (2015 10 28-29)/Making and Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio - CODE BLUE 2015.mp4 | 76.94 MB |
CODE BLUE 2013/CodeBlue01 various tricks for remote linux exploits by Seokha Lee (wh1ant).mp4 | 76.92 MB |
CODE BLUE 2015 (2015 10 28-29)/Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio - CODE BLUE 2015.mp4 | 76.24 MB |
CODE BLUE 2019/[CB19] KeynoteHacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter.mp4 | 73.15 MB |
CODE BLUE 2016 (10 18-21 2016)/[CB16] Esoteric Web Application Vulnerabilities by Andres Riancho.mp4 | 71.61 MB |
CODE BLUE 2013/CodeBlue01 Intel Management Engine Secrets by Igor Skochinsky.mp4 | 71.6 MB |
CODE BLUE 2017 (11 8-10, 2017)/[CB17] LG vs. Samsung Smart TV Which Is Better for Tracking You by Sangmin Lee.mp4 | 70.94 MB |
CODE BLUE 2019/[CB19] Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns.mp4 | 69.55 MB |
CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 The active use and exploitation of Microsoft s Application Compatibility Framework.mp4 | 69.53 MB |
CODE BLUE 2017 (11 8-10, 2017)/[CB17] George Hotz - Keynote Make your car self-driving using open-source software.mp4 | 68.26 MB |
CODE BLUE 2018/[CB18] How to hack SD-WAN and keep your sanity by Sergey Goreychik.mp4 | 67.73 MB |
CODE BLUE 2017 (11 8-10, 2017)/[CB17] Ory Segal - Passive Fingerprinting of HTTP 2 Clients..mp4 | 67.29 MB |