| Presentation | Speaker | Slides | ||
|---|---|---|---|---|
|
Windows Metafiles: An Analysis of the EMF Attack Surface & Recent Vulnerabilities |
Mateusz "j00ru" Jurczyk |
|
||
|
Forcing A Targeted LTE Cellphone Into An Unsafe Network |
Wanqiao Zhang & Qing Yang |
|
||
|
$hell on Earth: From Browser to System Compromise |
ZDI Team |
|
||
|
Demystifying the Secure Enclave Processor |
Tarjei "kernelpool" Mandt |
|
||
|
Strolling into Ring-0 via I/O Kit Drivers |
Patrick Wardle |
|
||
|
Rainbow Over the Windows: More Colors Than You Could Expect |
Peter Hlavaty & Jin Long |
|
||
|
Hacker-Machine Interface - State of the Union for SCADA HMI Vulnerabilities |
Brian Gorenc |
|
||
|
Breaking out of QEMU |
Qiang Li & Zhibin Hu |
|
||
|
Make iOS App more Robust and Security through Fuzzing |
Wei Wang & Zhaowei Wang |
|
||
|
Exploiting COF Vulnerabilities In The Linux Kernel |
Vitaly Nikolenko |
|
||
|
PHP Internals: Exploit Dev Edition |
Emmanuel Law |
|
Not available |
|
|
Active Incident Response |
Brian Candlish & Christian Teutenberg |
|
Not available |
|
|
Of Mice and Keyboards: On the Security of Modern Wireless Desktop Sets |
Matthias Deeg & Gerhard Klostermeier |
|
||
|
Firmware Biopsy: Towards Taming The Lunacy |
Tweek |
|
||
|
Leaking Windows Kernel Pointers |
WanderingGlitch |
|
||
|
FRAPL - Next Generation Reverse Engineering Framework |
Alex Hude & Max Bazaliy |
|
||
|
Documented to Fail |
James Forshaw |
|
||
|
Writing Malware While The Blue Team Is Staring At You |
Rob Fuller |
|
||
|
Fighting Metamorphism using Deep Neural Network with Fourier |
Sean Park |
|
||
|
Measuring Risk |
Ron Gula |
|
Not available |
|
|
You Just Got Popped.. That's Cool Bro, Your Friend the nightHawk Is Watching |
Daniel Eden & Roshan Maskey |
|
Not available |
|
|
On Her Majesty’s Secret Service – GRX and a Spy Agency |
Stephen Kho |
|
||
|
Orbiting The Saturn: Investigating A Decades-Old DRM System |
James Laird-Wah |
|
||
|
Fuzzflow Framework and Windows Guided Fuzzing |
Richard Johnson |
|
Not available |
|
|
Turncoat! An Insider's Guide To Attacking Container Technology |
Trevor Jay |
|
||
|
NA |
NA |
|
Not available |
|
|
Make Event Tracing Great Again |
Nate Rogers & Ben Lelonek |
|
||
|
AWS regrets: Gremlins in your Cloud Success |
Daniel Grzelak & Mike Fuller |
|
Not available |


