Monitoring & controlling kernel-mode events by HyperPlatform
|
Satoshi Tanda
|
The Remote Metamorphic Engine
|
Amro Abdelgawad
|
Process Failure Modes
|
James Forshaw
|
How Do I Crack Satellite and Cable Pay TV?
|
Chris Gerlinsky
|
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
|
Ang Cui
,
Francois Charbonneau
,
Jatin Kataria
|
BBS-Era Exploitation for Fun and Anachronism
|
Derek Soeder
,
Paul Mehta
|
Keystone: the last missing framework of Reverse Engineering
|
Nguyen Anh Quynh
|
Black box reverse engineering for unknown/custom instruction sets
|
David Carne
|
Sol[IDA]rity
|
Markus Gaasedelen
,
Nick Burnett
|
JavaJournal
|
Jason Geffner
|
Abusing the NT Kernel Shim Engine
|
Alex Ionescu
|
More Flash, More Fun!
|
Natalie Silvanovich
|
Hardware-Assisted Rootkits and Instrumentation: ARM Edition
|
Matt Spisak
|
Go Speed Tracer
|
Richard Johnson
|
Visiting The Bear Den
|
Joan Calvet
,
Jessy Campos
,
Thomas Dupuy
|
Shooting the OS X El Capitan Kernel Like a Sniper
|
Liang Chen
,
Qidan He
|
When Governments Attack
|
Cooper Quintin
,
Eva Galperin
|
Dangerous Optimizations and the Loss of Causality
|
Robert C. Seacord
|
Breaking Band
|
Nico Golde
,
Daniel Komaromy
|
Movfuscator-Be-Gone
|
Julian Kirsch
,
Clemens Jonischkeit
|
Reverse Engineering ISC controllers
|
Jessy Diamond Exum
|