Star 0

Talks

Title Humans
Tunnel War: Attack Android Through Multiple Hidden Interface Hanxiang Wen , Jiashui Wang
Post exploit goodness on a Mainframe: SPECIAL is the new root Ayoub Elaassal
Reverse Engineering x86 Processor Microcode Benjamin Kollenda , Ruhr-University Bochum
UPnP: Unlimited Proxies and Pwnage Waylon Grange
Practical JTAG:from 0 to 1
Social Engineering at Scale Sara-Jayne Terp , AppNexus , Columbia University
Scalable Threat Hunting Strategies Built to Last Dhia Mahjoub , Cisco Umbrella
Shellcodes are for the 99% Bing Sun , Chong Xu , Stanley Zhu , McAfee
Chainspotting: Building Exploit Chains with Logic Bugs Georgi Geshev , MWR InfoSecurity
TPM Genie: Attacking the Hardware Root of Trust For Less Than $50 NCC Group
Exploring Qualcomm Baseband via ModKit Peter Pi
Attacks and Analysis of the Samsung S8 from Mobile PWN2OWN Guang Gong , Jianjun Dai , Qihoo 360
Detecting Reverse Engineering with Canaries Collin Mulliner
Accelerating Canadian Cyber Innovation
Grandma's old bag, how outdated libraries spoil Android app security (update 2018) Marc Schoenefeld
Blackhat Ethereum Jay Little , Ryan Stortz
Analyzing & Breaking QNX Exploit Mitigations and PRNGs Midnight Blue Labs
Forget NDIS, TDI or NIC Drivers : The Shadow Network Stack Hidden In Windows 8+ Alex Ionescu