The Shadow Brokers – Cyber Fear Game-Changers
|
Matt Suiche
|
Pwned in Translation - from Subtitles to RCE
|
Omri Herscovici
,
Omer Gull
|
The Ro(o)tten Apple: Vulnerabilities heaven behind the iOS sandbox
|
Nikias Bassen
|
Transforming Open Source to Open Access in Closed Applications: Finding Vulnerabilities in Adobe Reader's XSLT Engine
|
Brian Gorenc
,
Abdul-Aziz Hariri
,
Jasiel Spelman
|
Butterfly Effect and Program Mistake ---- Exploit an "Unexploitable" Chrome Bug
|
Guang Gong
|
Exploiting and abusing web applications flaws in industrial and network communication devices
|
Bertin Bervis
|
Finding iOS vulnerabilities in an easy way
|
Tielei Wang
,
Hao Xu
|
Penetration through ICS Development Software - potentially devastating attack vector or not? CODESYS 0days examples.
|
Yuriy Gurkin
|
Dolphin Attacks:Manipulating Voice Controllable Systems silently
|
Wenyuan Xu
,
Janhao Liu
|
How to hide your browser 0-Days
|
Zoltan Balazs
|
The Virtio Security in Qemu
|
Qiang Li
,
Zhibin Hu
|
Bypass 2FA, Stealing Private Keys, and the Introduction to 2FAssassin
|
Maxwell Koh
|