×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
alexander-bolshev documents
Technology
DTM COMPONENTS: SHADOW KEYS TO THE ICS KINGDOM
Technology
HART (in)security: how one transmitter can compromise whole plant
Software
With BIGDATA comes BIG Responsibility: Practical exploiting of MDX injections
Technology
SSRF DoS relaying
Technology
HART As An Attack Vector: From Current Loop to Application Layer
Technology
ICSCorsair: How I will PWN your ERP through 4-20 mA current loop
Technology
S4x15: how to fuzz 100+ industrial DTMs and stay alive
Technology
SCADA and mobile (BlackHat London Mobile Security Summit 2015)
Technology
Never Trust Your Inputs
Devices & Hardware
Never Trust Your Inputs or how to fool an ADC
Devices & Hardware
Never Trust Your Inputs or how to fool an ADC
Mobile
When the medicine is more dangerous than the disease: Mobile Antivirus Security Assessment