Tunnel War: Attack Android Through Multiple Hidden Interface
|
Hanxiang Wen
,
Jiashui Wang
|
Post exploit goodness on a Mainframe: SPECIAL is the new root
|
Ayoub Elaassal
|
Reverse Engineering x86 Processor Microcode
|
Benjamin Kollenda
,
Ruhr-University Bochum
|
UPnP: Unlimited Proxies and Pwnage
|
Waylon Grange
|
Practical JTAG:from 0 to 1
|
|
Social Engineering at Scale
|
Sara-Jayne Terp
,
AppNexus
,
Columbia University
|
Scalable Threat Hunting Strategies Built to Last
|
Dhia Mahjoub
,
Cisco Umbrella
|
Shellcodes are for the 99%
|
Bing Sun
,
Chong Xu
,
Stanley Zhu
,
McAfee
|
Chainspotting: Building Exploit Chains with Logic Bugs
|
Georgi Geshev
,
MWR InfoSecurity
|
TPM Genie: Attacking the Hardware Root of Trust For Less Than $50
|
NCC Group
|
Exploring Qualcomm Baseband via ModKit
|
Peter Pi
|
Attacks and Analysis of the Samsung S8 from Mobile PWN2OWN
|
Guang Gong
,
Jianjun Dai
,
Qihoo 360
|
Detecting Reverse Engineering with Canaries
|
Collin Mulliner
|
Accelerating Canadian Cyber Innovation
|
|
Grandma's old bag, how outdated libraries spoil Android app security (update 2018)
|
Marc Schoenefeld
|
Blackhat Ethereum
|
Jay Little
,
Ryan Stortz
|
Analyzing & Breaking QNX Exploit Mitigations and PRNGs
|
Midnight Blue Labs
|
Forget NDIS, TDI or NIC Drivers : The Shadow Network Stack Hidden In Windows 8+
|
Alex Ionescu
|