×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of alexander-bolshev
DTM COMPONENTS: SHADOW KEYS TO THE ICS KINGDOM
256 views
With BIGDATA comes BIG Responsibility: Practical exploiting of MDX injections
165 views
SSRF DoS relaying
540 views
HART As An Attack Vector: From Current Loop to Application Layer
1.905 views
ICSCorsair: How I will PWN your ERP through 4-20 mA current loop
238 views
S4x15: how to fuzz 100+ industrial DTMs and stay alive
1.072 views
SCADA and mobile (BlackHat London Mobile Security Summit 2015)
1.166 views
Never Trust Your Inputs
740 views
Never Trust Your Inputs or how to fool an ADC
745 views
Never Trust Your Inputs or how to fool an ADC
737 views
When the medicine is more dangerous than the disease: Mobile Antivirus Security Assessment
627 views