内容如下:
├── us-19-Amini-Worm-Charming-Harvesting-Malware-Lures-For-Fun-And-Profit.pdf
├── us-19-Aumasson-Lessons-From-Two-Years-Of-Crypto-Audits.pdf
├── us-19-Baril-He-Said-She-Said-Poisoned-RDP-Offense-And-Defense-wp.pdf
├── us-19-Baril-He-Said-She-Said-Poisoned-RDP-Offense-And-Defense.pdf
├── us-19-Bernal-Detecting-Malicious-Files-With-YARA-Rules-As-They-Traverse-The-Network.pdf
├── us-19-Burke-ClickOnce-And-Youre-In-When-Appref-Ms-Abuse-Is-Operating-As-Intended-wp.pdf
├── us-19-Burke-ClickOnce-And-Youre-In-When-Appref-Ms-Abuse-Is-Operating-As-Intended.pdf
├── us-19-Chau-A-Decade-After-Bleichenbacher-06-RSA-Signature-Forgery-Still-Works-wp.pdf
├── us-19-Chau-A-Decade-After-Bleichenbacher-06-RSA-Signature-Forgery-Still-Works.pdf
├── us-19-Chen-Biometric-Authentication-Under-Threat-Liveness-Detection-Hacking-wp.pdf
├── us-19-Chen-Biometric-Authentication-Under-Threat-Liveness-Detection-Hacking.pdf
├── us-19-Feng-The-Most-Secure-Browser-Pwning-Chrome-From-2016-To-2019-wp.pdf
├── us-19-Feng-The-Most-Secure-Browser-Pwning-Chrome-From-2016-To-2019.pdf
├── us-19-Gong-Bypassing-The-Maginot-Line-Remotely-Exploit-The-Hardware-Decoder-On-Smartphone-wp.pdf
├── us-19-Gong-Bypassing-The-Maginot-Line-Remotely-Exploit-The-Hardware-Decoder-On-Smartphone.pdf
├── us-19-Hypponen-Responding-To-A-Cyber-Attack-With-Missiles.pdf
├── us-19-Jablonski-Attacking-Electric-Motors-For-Fun-And-Profit-wp.pdf
├── us-19-Jablonski-Attacking-Electric-Motors-For-Fun-And-Profit.pdf
├── us-19-Joly-Hunting-For-Bugs-Catching-Dragons.pdf
├── us-19-Kettle-HTTP-Desync-Attacks-Smashing-Into-The-Cell-Next-Door-wp.pdf
├── us-19-Kettle-HTTP-Desync-Attacks-Smashing-Into-The-Cell-Next-Door.pdf
├── us-19-Matula-APICs-Adventures-In-Wonderland-wp.pdf
├── us-19-Matula-APICs-Adventures-In-Wonderland.pdf
├── us-19-Matula-Block-APICs-Adventures-In-Wonderland-Exploits.zip
├── us-19-Metcalf-Attacking-And-Defending-The-Microsoft-Cloud\ (1).pdf
├── us-19-Metcalf-Attacking-And-Defending-The-Microsoft-Cloud.pdf
├── us-19-Metzman-Going-Beyond-Coverage-Guided-Fuzzing-With-Structured-Fuzzing.pdf
├── us-19-Mulliner-Come-Join-The-CAFSA-Continuous-Automated-Firmware-Security-Analysis-wp.pdf
├── us-19-Mulliner-Come-Join-The-CAFSA-Continuous-Automated-Firmware-Security-Analysis.pdf
├── us-19-Munoz-SSO-Wars-The-Token-Menace\ (1).pdf
├── us-19-Munoz-SSO-Wars-The-Token-Menace.pdf
├── us-19-Prevost-How-Insurers-View-The-World.pdf
├── us-19-Robert-Messaging-Layer-Security-Towards-A-New-Era-Of-Secure-Group-Messaging.pdf
├── us-19-Santamarta-Arm-IDA-And-Cross-Check-Reversing-The-787-Core-Network.pdf
├── us-19-Sedova-Know-How-Data-Can-Shape-Security-Engagement.pdf
├── us-19-Shaik-New-Vulnerabilities-In-5G-Networks-wp.pdf
├── us-19-Shaik-New-Vulnerabilities-In-5G-Networks.pdf
├── us-19-Shortridge-Controlled-Chaos-The-Inevitable-Marriage-Of-DevOps-And-Security.pdf
├── us-19-Shupeng-All-The-4G-Modules-Could-Be-Hacked.pdf
├── us-19-Shwartz-Selling-0-Days-To-Governments-And-Offensive-Security-Companies.pdf
├── us-19-Silvanovich-Look-No-Hands-The-Remote-Interactionless-Attack-Surface-Of-The-iPhone.pdf
├── us-19-Simakov-Finding-A-Needle-In-An-Encrypted-Haystack-Leveraging-Cryptographic-Abilities-To-Detect-The-Most-Prevalent-Attacks-On-Active-Directory.pdf
├── us-19-Tyagi-Defense-Against-Rapidly-Morphing-DDOS.pdf
├── us-19-Valenta-Monsters-In-The-Middleboxes-Building-Tools-For-Detecting-HTTPS-Interception.pdf
├── us-19-Vanhoef-Dragonblood-Attacking-The-Dragonfly-Handshake-Of-WPA3-wp.pdf
├── us-19-Vanhoef-Dragonblood-Attacking-The-Dragonfly-Handshake-Of-WPA3.pdf
├── us-19-Williams-Detecting-Deep-Fakes-With-Mice-wp.pdf
├── us-19-Williams-Detecting-Deep-Fakes-With-Mice.pdf
├── us-19-Wixey-Im-Unique-Just-Like-You-Human-Side-Channels-And-Their-Implications-For-Security-And-Privacy.pdf
├── us-19-Wu-Battle-Of-Windows-Service-A-Silver-Bullet-To-Discover-File-Privilege-Escalation-Bugs-Automatically.pdf
└── us-19-Zaikin-Reverse-Engineering-WhatsApp-Encryption-For-Chat-Manipulation-And-More.pdf