PDF Attack: A Journey From the Exploit Kit to the Shellcode
|
Jose Miguel Esparza
,
Fox-IT
|
Advanced JPEG Steganography and Detection
|
John Ortiz
,
Harris IT Services
|
Discovering Debug Interfaces with the JTAGulator
|
Joe Grand
,
Grand Idea Studio, Inc.
|
Beyond 'Check The Box': Powering Intrusion Investigations
|
Jim Aldridge
,
Mandiant
|
I Know You Want Me - Unplugging PlugX
|
Takahiro Haruyama
,
Hiroshi Suzuki
,
Internet Initiative Japan, Inc.
|
JS Suicide: Using JavaScript Security Features to Kill JS Security
|
Ahamed Nafeez
,
Citrix Systems
|
OFFENSIVE: Exploiting DNS Servers Changes
|
Leonardo Nve
,
S21Sec
|
The Machines That Betrayed Their Masters
|
Glenn Wilkinson
,
SensePost
|
Z:\Make Troy\, Not War: Case Study of the Wiper APT in Korea, and Beyond
|
Kyle Yang
,
Fortinet, Inc.
|
The Inner Workings of Mobile Cross-Platform Technologies
|
Simon Roses Femerling
,
VULNEX
|
Diving Into IE 10's Enhanced Protected Mode Sandbox
|
Mark Vincent Yason
,
IBM
|
USB Attacks Need Physical Access Right? Not Any More...
|
Andy Davis
,
NCC Group
|
Persist It: Using and Abusing Microsoft's Fix It Patches
|
Jon Erickson
,
iSIGHT Partners
|
Ultimate Dom Based XSS Detection Scanner on Cloud
|
Nera W. C. Liu
,
Albert Yu
,
Yahoo!
|
AIS Exposed. Understanding Vulnerabilities and Attacks 2.0
|
Marco Balduzzi
,
Trend Micro Research
|
Dude, WTF in My CAN!
|
Alberto Garcia Illera
,
Javier Vazquez Vidal
,
CarIT
|
Privacy-by-Design for the Security Practitioner
|
Richard Chow
,
Intel Corporation
|
Owning a Building: Exploiting Access Control and Facility Management Systems
|
Billy Rios
,
Qualys
|
Tomorrow's News is Today's Intel: Journalists as Targets and Compromise Vectors
|
Morgan Marquis-Boire
,
Shane Huntley
,
Google Inc.
|
SAP, Credit Cards, and the Bird That Knows Too Much
|
Ertunga Arsal
,
ESNC
|
Say It Ain't So - An Implementation of Deniable Encryption
|
Ari Trachtenberg
,
Boston University
|
Let's Fix the Mess
|
Dr. Steve Crocker
,
Internet Corporation of Assigned Names and Numbers
|
You Can't See Me: A Mac OS X Rootkit Uses the Tricks You Haven't Known Yet
|
Sung-ting Tsai
,
Ming-chieh Pan
,
Team T5
|
Solutum Cumulus Mediocris
|
Eldar Marcussen
,
BAE Systems Applied Intelligence
|
Building Trojan Hardware at Home
|
JP Dunning
|
UI Redressing Attacks on Android Devices Revisited
|
Marcus Niemietz
,
Ruhr-University Bochum
|
Disasters in the Making: How I Torture Open Government Data Systems for Fun, Profit, and Time Travel
|
Tom Keenan
,
University of Calgary
|
Comprehensive Virtual Appliance Detection
|
Kang Li
,
Xiaoning Li
,
University of Georgia
|
Scan All the Things - Project Sonar
|
Mark Schloesser
,
Rapid7
|
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts
|
Nitesh Dhanjani
|