Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk
|
Dr. Silke Holtmanns
,
Bhanu Kotte
,
Siddharth Rao
,
Bell Labs Nokia
,
Aalto University
|
Use-After-Use-After-Free: Exploit UAF by Generating Your Own
|
Guanxing Wen
,
PanguTeam
|
(Pen)Testing Vehicles with CANToolz
|
Alexey Sintsov
|
Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit
|
Ali Abbasi
,
Majid Hashemi
,
Distributed and Embedded Systems Security Group, University of Twente
,
Quarkslab
|
Mobile Espionage in the Wild: Pegasus and Nation-State Level Attacks
|
Max Bazaliy
,
Seth Hardy
,
Andrew Blaich
,
Lookout
|
ARMageddon: How Your Smartphone CPU Breaks Software-Level Security and Privacy
|
Moritz Lipp
,
Clémentine Maurice
,
Graz University Of Technology
|
50 Thousand Needles in 5 Million Haystacks: Understanding Old Malware Tricks to Find New Malware Families
|
Veronica Valeros
,
Karel Bartos
,
Lukas Machlica
,
Cognitive Threat Analytics, Cisco Systems
|
Narcos Counterfeiters and Scammers: An Approach to Visualize Illegal Markets
|
Andrew Lewman
,
Stevan Keraudy
,
Farsight Security, Inc.
,
CybelAngel
|
Cyber Judo: Offensive Cyber Defense
|
Tal Be'ery
,
Itai Grady
,
Microsoft Corporation
|
Breaking Big Data: Evading Analysis of the Metadata of Your Life
|
David Venable
,
Masergy Communications
|
Rooting EVERY Android: From Extension to Exploitation
|
Di Shen
,
Jiahong (James) Fang
,
Tencent Keen Security Lab
|
Real-World Post-Quantum Cryptography: Introducing the OpenQuantumSafe Software Project
|
Jennifer Fernick
,
Centre for Applied Cryptographic Research, University of Waterloo
|
Randomization Can't Stop BPF JIT Spray
|
Elena Reshetova
,
N. Asokan
,
Filippo Bonazzi
,
Intel OTC Finland
,
University of Helsinki
,
Aalto University
|
Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0
|
Ronghai Yang
,
Wing Cheong Lau
,
Department of Information Engineering, The Chinese University of Hong Kong
|
Chasing Foxes by the Numbers: Patterns of Life and Activity in Hacker Forums
|
Christopher Ahlberg
,
Recorded Future
|
Backslash Powered Scanning: Hunting Unknown Vulnerability Classes
|
James Kettle
,
Portswigger Web Security
|
Breaking BHAD: Abusing Belkin Home Automation Devices
|
Scott Tenaglia
,
Joe Tanen
,
Invincea Labs
|
Code Deobfuscation: Intertwining Dynamic Static and Symbolic Approaches
|
Robin David
,
Sébastien Bardin
,
CEA LIST
|
AI based Antivirus: Can AlphaAV Win the Battle in which Man Has Failed?
|
Thomas Lei Wang
,
Liuping Hou
,
Zhijun Jia
,
Yanyan Ji
,
Baidu Inc.
|
How to Fool an ADC Part II or Hiding Destruction of Turbine with a Little Help of Signal Processing
|
Alexander Bolshev
,
Gabriel Gonzalez
,
IOActive, Inc.
|
Locknote: Conclusions and Key Takeaways from Black Hat Europe 2016
|
Jeff Moss
,
Sharon Conheady
,
Daniel Cuthbert
,
Chris Wysopal
,
U.S. Department of Homeland Security Advisory Council
,
First Defence Information Security
,
SensePost
,
Veracode
|
Automating Incident Response: Sit Back and Relax Bots are Taking Over…
|
Elvis Hovor
,
Mohamed El-Sharkawi
,
Accenture
|
Another Brick Off the Wall: Deconstructing Web Application Firewalls Using Automata Learning
|
George Argyros
,
Ioannis Stais
,
Columbia University
,
Census S.A.
|
I Know What You Saw Last Minute - The Chrome Browser Case
|
Ran Dubin
,
Ben Gurion University, Israel
|
Towards a Policy-Agnostic Control-Flow Integrity Implementation
|
Dean Sullivan
,
Orlando Arias
,
Yier Jin
,
Ahmad-Reza Sadeghi
,
University of Central Florida
,
Technische Universität Darmstadt
|
Witchcraft Compiler Collection: Towards Self Aware Computer Programs
|
Jonathan Brossard
,
MOABI
|
EGO MARKET: When People's Greed for Fame Benefits Large-Scale Botnets
|
Masarah Paquet-Clouston
,
Olivier Bilodeau
,
GoSecure
|
Attacking Windows by Windows
|
Yin Liang
,
Li Zhou
,
Tencent, Inc.
|
Bypassing Secure Boot Using Fault Injection
|
Niek Timmers
,
Albert Spruyt
,
Riscure
|
Inside Web Attacks: The Real Payloads
|
John Graham-Cumming
,
Cloudflare, Inc.
|
Effective File Format Fuzzing – Thoughts Techniques and Results
|
Mateusz Jurczyk
,
Google Inc.
|
DRAMA: How Your DRAM Becomes a Security Problem
|
Michael Schwarz
,
Anders Fogh
,
Graz University Of Technology
,
G DATA Advanced Analytics
|
GPU Security Exposed
|
Justin Taft
,
NCC Group
|
Pocket-Sized Badness: Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game
|
Federico Maggi
,
Stefano Zanero
,
Trend Micro, Inc.
,
Politecnico di Milano
|
WiFi-Based IMSI Catcher
|
Piers O'Hanlon
,
Ravishankar Borgaonkar
,
University of Oxford
|
Stumping the Mobile Chipset
|
Adam Donenfeld
,
Check Point Software Technologies
|
Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross-Device Tracking
|
Vasilios Mavroudis
,
Shuang Hao
,
Yanick Fratantonio
,
Federico Maggi
,
Giovanni Vigna
,
Christopher Kruegel
,
University College London
,
UC Santa Barbara
,
Trend Micro, Inc.
,
UC Santa Barbara / Lastline
|
CTX: Eliminating BREACH with Context Hiding
|
Dimitris Karakostas
,
Eva Sarafianou
,
Dionysis Zindros
,
Aggelos Kiayias
,
University of Athens
,
University of Edinburgh
|
When Virtualization Encounter AFL: A Portable Virtual Device Fuzzing Framework with AFL
|
Jack Tang
,
Moony Li
,
Trend Micro, Inc.
|
Bypassing Clang's SafeStack for Fun and Profit
|
Enes Goktas
,
Herbert Bos
,
Georgios Portokalidis
,
Cristiano Giuffrida
,
Elias Athanasopoulos
,
Robert Gawlik
,
Benjamin Kollenda
,
Aggelos Oikonomopoulos
,
Vrije Universiteit Amsterdam
,
Stevens Institute of Technology
,
Ruhr-Universität Bochum
|
Flip Feng Shui: Rowhammering the VM's Isolation
|
Kaveh Razavi
,
Ben Gras
,
Erik Bosman
,
Bart Preneel
,
Cristiano Giuffrida
,
Herbert Bos
,
Vrije Universiteit Amsterdam
,
Katholieke Universiteit Leuven
|