You may have paid more than you imagine—Replay Attacks on Ethereum Smart Contracts |
DEF CON 26
|
Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability |
DEF CON 26
|
Impersonate a 4G user through LTE IRAT handover vulnerabilities |
2018 SyScan360 Singapore
|
'Ghost Telephonist' Impersonates You Through LTE CSFB |
DEF CON 25
|
DC to DEF CON: Q&A; with Congressmen James Langevin and Will Hurd |
DEF CON 25
|
'Ghost Telephonist' Link Hijack Exploitations in 4G LTE CS Fallback |
Black Hat USA 2017
|
Time is On My Side: Forging a Wireless Time Signal to Attack NTP Servers |
HITBSecConf2016 – Amsterdam
|
Build a free cellular traffic capture tool with a vxworks based femoto |
DEF CON 23
|