Presentation | Speaker | Slides | ||
---|---|---|---|---|
Windows Metafiles: An Analysis of the EMF Attack Surface & Recent Vulnerabilities |
Mateusz "j00ru" Jurczyk |
![]() |
||
Forcing A Targeted LTE Cellphone Into An Unsafe Network |
Wanqiao Zhang & Qing Yang |
![]() |
||
$hell on Earth: From Browser to System Compromise |
ZDI Team |
![]() |
||
Demystifying the Secure Enclave Processor |
Tarjei "kernelpool" Mandt |
![]() |
||
Strolling into Ring-0 via I/O Kit Drivers |
Patrick Wardle |
![]() |
||
Rainbow Over the Windows: More Colors Than You Could Expect |
Peter Hlavaty & Jin Long |
![]() |
||
Hacker-Machine Interface - State of the Union for SCADA HMI Vulnerabilities |
Brian Gorenc |
![]() |
||
Breaking out of QEMU |
Qiang Li & Zhibin Hu |
![]() |
||
Make iOS App more Robust and Security through Fuzzing |
Wei Wang & Zhaowei Wang |
![]() |
||
Exploiting COF Vulnerabilities In The Linux Kernel |
Vitaly Nikolenko |
![]() |
||
PHP Internals: Exploit Dev Edition |
Emmanuel Law |
![]() |
Not available |
|
Active Incident Response |
Brian Candlish & Christian Teutenberg |
![]() |
Not available |
|
Of Mice and Keyboards: On the Security of Modern Wireless Desktop Sets |
Matthias Deeg & Gerhard Klostermeier |
![]() |
||
Firmware Biopsy: Towards Taming The Lunacy |
Tweek |
![]() |
||
Leaking Windows Kernel Pointers |
WanderingGlitch |
![]() |
||
FRAPL - Next Generation Reverse Engineering Framework |
Alex Hude & Max Bazaliy |
![]() |
||
Documented to Fail |
James Forshaw |
![]() |
||
Writing Malware While The Blue Team Is Staring At You |
Rob Fuller |
![]() |
||
Fighting Metamorphism using Deep Neural Network with Fourier |
Sean Park |
![]() |
||
Measuring Risk |
Ron Gula |
![]() |
Not available |
|
You Just Got Popped.. That's Cool Bro, Your Friend the nightHawk Is Watching |
Daniel Eden & Roshan Maskey |
![]() |
Not available |
|
On Her Majesty’s Secret Service – GRX and a Spy Agency |
Stephen Kho |
![]() |
||
Orbiting The Saturn: Investigating A Decades-Old DRM System |
James Laird-Wah |
![]() |
||
Fuzzflow Framework and Windows Guided Fuzzing |
Richard Johnson |
![]() |
Not available |
|
Turncoat! An Insider's Guide To Attacking Container Technology |
Trevor Jay |
![]() |
||
NA |
NA |
![]() |
Not available |
|
Make Event Tracing Great Again |
Nate Rogers & Ben Lelonek |
![]() |
||
AWS regrets: Gremlins in your Cloud Success |
Daniel Grzelak & Mike Fuller |
![]() |
Not available |