×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of alexander-bolshev
DTM COMPONENTS: SHADOW KEYS TO THE ICS KINGDOM
258 views
HART (in)security: how one transmitter can compromise whole plant
3.889 views
With BIGDATA comes BIG Responsibility: Practical exploiting of MDX injections
172 views
SSRF DoS relaying
549 views
HART As An Attack Vector: From Current Loop to Application Layer
1.932 views
ICSCorsair: How I will PWN your ERP through 4-20 mA current loop
238 views
S4x15: how to fuzz 100+ industrial DTMs and stay alive
1.072 views
SCADA and mobile (BlackHat London Mobile Security Summit 2015)
1.166 views
Never Trust Your Inputs
741 views
Never Trust Your Inputs or how to fool an ADC
747 views
Never Trust Your Inputs or how to fool an ADC
741 views
When the medicine is more dangerous than the disease: Mobile Antivirus Security Assessment
627 views