Star 0

Talks

Title Humans
The Shadow Brokers – Cyber Fear Game-Changers Matt Suiche
Pwned in Translation - from Subtitles to RCE Omri Herscovici , Omer Gull
The Ro(o)tten Apple: Vulnerabilities heaven behind the iOS sandbox Nikias Bassen
Transforming Open Source to Open Access in Closed Applications: Finding Vulnerabilities in Adobe Reader's XSLT Engine Brian Gorenc , Abdul-Aziz Hariri , Jasiel Spelman
Butterfly Effect and Program Mistake ---- Exploit an "Unexploitable" Chrome Bug Guang Gong
Exploiting and abusing web applications flaws in industrial and network communication devices Bertin Bervis
Finding iOS vulnerabilities in an easy way Tielei Wang , Hao Xu
Penetration through ICS Development Software - potentially devastating attack vector or not? CODESYS 0days examples. Yuriy Gurkin
Dolphin Attacks:Manipulating Voice Controllable Systems silently Wenyuan Xu , Janhao Liu
How to hide your browser 0-Days Zoltan Balazs
The Virtio Security in Qemu Qiang Li , Zhibin Hu
Bypass 2FA, Stealing Private Keys, and the Introduction to 2FAssassin Maxwell Koh