Make ARM Shellcode Great Again
|
Saumil Shah
|
Using SmartNICs to Provide Better Data Center Security
|
Jack Matheson
|
Pwning the 44CON Nerf gun
|
Chris Wade
|
Security module for php7 – Killing bugclasses and virtual-patching the rest!
|
Julien Voisin
|
Insight into fuzzing and pwning of Adobe Flash
|
Jie Zeng
|
Catch Me If You Can: Ephemeral Vulnerabilities in Bug Bounties
|
Shubham Shah
|
For the Love of Money: Finding and exploiting vulnerabilities in mobile point of sales systems
|
Leigh-Anne Galloway
|
The UK’s Code of Practice for Security in Consumer IoT Products and Services
|
David Rogers
|
Subverting Direct X Kernel For Gaining Remote System
|
Rancho Han
|
Kill All Humans… Bugs! : Machine Learning to the rescue of code review
|
Philippe Arteau
|
Bypassing Port-Security In 2018 – Defeating MacSEC and 802.1x-2010
|
Gabriel Ryan
|
Exploits with Scratch
|
Kevin Sheldrake
|
How to Explain Post-Quantum Cryptography to a Middle School Student
|
Klaus Schmeh
|
They’re All Scorpions – Successful SecOps in a Hostile Workplace
|
|
Weak analogies make poor realities – are we sitting on a Security Debt Crisis?
|
Charl van der Walt
|
Automating myself out of a job – A pentesters guide to left shifting security testing
|
Jahmel Harris
|
So You Want to Red Team?
|
Lawrence Munro
|
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition – and frankly, everywhere else
|
Guy Barnhart-Magen
|
Reverse Engineering and Bug Hunting on KMDF Drivers
|
Enrique Nissim
|
Ghost in the Locks – owning electronic locks without leaving a trace
|
Tomi Tuominen
|