https://www.youtube.com/user/hitbsecconf/videos
56:29
#HITB2018AMS D1T2 - Attacking Microsoft’s .NET Framework Through CLR - Yu Hong & Shikang Xing
53:07
#HITB2018AMS D1T1 - Brida: When Burp Suite meets Frida - Federico Dotta & Piergiovanni Cipolloni
47:35
#HITB2018AMS D1T2 - Smashing Ethereum Smart Contracts for Fun and ACTUAL Profit - Bernhard Mueller
59:26
#HITB2018AMS D1T1 - Real World Attacks Against Secure Elements - Don Bailey
52:14
#HITB2018AMS KEYNOTE 1: The Future, The Past, and … Wait, Where the Hell are We Now? - M. Marschalek
17:23
#HITB2018AMS Welcome Address: Improving Incentives for Cybersecurity - Michel van Eeten
24:32
#HITB2018AMS CommSec D2 - Smart Contract (In)Security - Ben Schmidt
25:42
#HITB2018AMS CommSec D2 - Hacking a Hospital for Fun and Profit - Asaf Cohen & Ofir Kamil
1:00:06
#HITB2018AMS CommSec D2 - PyREBox: Making Dynamic Instrumentation Great Again - X. Ugarte-Pedrero
32:02
#HITB2018AMS CommSec D2 - ProdSec: A Technical Approach - Jeremy Brown
34:31
#HITB2018AMS CommSec D2 - Automatic Generation of ROP Chains - Ricardo. J. Rodríguez & Daniel Uroz
25:40
#HITB2018AMS CommSec D2 - Hiding Tasks via Hardware Task Switching - Kyeong Joo Jung
31:50
#HITB2018AMS CommSec D1 - Attacking IoT Speakers - Stephen Hilt
25:23
#HITB2018AMS CommSec D1 - A Deep Dive Into Malicious Documents - Josh Stroschein
32:30
#HITB2018AMS CommSec D1 - Faster, Wider, Greater: Modern Pentest Tricks - Thomas Debize
29:35
#HITB2018AMS CommSec D1 - How to Find and Exploit Bugs in IoT Devices - Kelvin Wong
29:34
#HITB2018AMS CommSec D1 - Keynterceptor: Press Any Key to Continue - Niels van Dijkhuizen
59:53
#HITB2018AMS CommSec D1 - An Isolated Data Center Security Policy Model Using SmartNICs - Ofir Arkin
39:21
#HITB2018AMS CommSec D1 - Behaviors and Patterns of Rogue Hosting Providers - D. Mahjoub & S. Brown
31:29
#HITB2018AMS CommSec D1 - Steganography Ante Portas - Steffen Wendzel
40:12
#HITB2018AMS CommSec D1 - The Life & Death of Kernel Object Abuse - Salf ElSherei & Ian Kronquist