Star 0

Talks

Title Humans
Make ARM Shellcode Great Again Saumil Shah
Using SmartNICs to Provide Better Data Center Security Jack Matheson
Pwning the 44CON Nerf gun Chris Wade
Security module for php7 – Killing bugclasses and virtual-patching the rest! Julien Voisin
Insight into fuzzing and pwning of Adobe Flash Jie Zeng
Catch Me If You Can: Ephemeral Vulnerabilities in Bug Bounties Shubham Shah
For the Love of Money: Finding and exploiting vulnerabilities in mobile point of sales systems Leigh-Anne Galloway
The UK’s Code of Practice for Security in Consumer IoT Products and Services David Rogers
Subverting Direct X Kernel For Gaining Remote System Rancho Han
Kill All Humans… Bugs! : Machine Learning to the rescue of code review Philippe Arteau
Bypassing Port-Security In 2018 – Defeating MacSEC and 802.1x-2010 Gabriel Ryan
Exploits with Scratch Kevin Sheldrake
How to Explain Post-Quantum Cryptography to a Middle School Student Klaus Schmeh
They’re All Scorpions – Successful SecOps in a Hostile Workplace
Weak analogies make poor realities – are we sitting on a Security Debt Crisis? Charl van der Walt
Automating myself out of a job – A pentesters guide to left shifting security testing Jahmel Harris
So You Want to Red Team? Lawrence Munro
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition – and frankly, everywhere else Guy Barnhart-Magen
Reverse Engineering and Bug Hunting on KMDF Drivers Enrique Nissim
Ghost in the Locks – owning electronic locks without leaving a trace Tomi Tuominen