Attacks on UEFI Security
|
Rafal Wojtczuk
,
Corey Kallenberg
|
A new class of vulnerability in SMI Handlers of BIOS/UEFI Firmware
|
Andrew Furtak
,
John Loucaides
,
Intel Corporation
|
FreeSentry: Protecting against use-after-free vulnerabilities due to dangling pointers
|
Cisco Systems
|
DLL Hijacking' on OS X? #@%& Yeah!
|
Patrick Wardle
,
Synack
|
How many million BIOSes would you like to infect?
|
Xeno Kovah
,
Corey Kallenberg
,
LegbaCore
|
I see therefore I am.... You
|
|
Attacking WebKit Applications by exploiting memory corruption bugs
|
Liang Chen
,
KeenTeam
|
Sexrets in LoadLibrary
|
Yang Yu
,
Tencent, Inc.
|
NDIS Packet of Death: Turning Windows' Complexity Against Itself
|
Nitay Artenstein
|
Userland Exploits of Pangu 8
|
Team Pangu
,
PanguTeam
|
From baseband to bitstream and back again: What security researchers really want to do with SDR
|
Andy Davis
,
NCC Group
|
Credential Assessment: Mapping Privilege Escalation at Scale
|
|
Smart COM fuzzing tool - Explore More Sandbox Bypassing Surface in COM objects
|
Haifei Li
,
Xiaoning Li
,
Intel Corporation
|
Project Zero: Making 0days Hard
|
Chris Evans
,
Ben Hawkes
,
Google Inc.
|
Memminer: Real-Time Passive Volatile Memory Inspection Inside Virtual Machines
|
|
Wolf in Sheep's Clothing: Your Next APT is Already Whitelisted
|
Fabio Assolini
|
Bootkit via SMS: 4G access level security assessment
|
Timur Yunusov
,
Kirill Nesterov
|
UEFI, Open Platforms and the Defender's Dillema
|
Vincent Zimmer
,
Intel Corporation
|
Taming wild copies: from hopeless crash to working exploit
|
Chris Evans
,
Google Project Zero
|
There's Something About WMI
|
Mandiant
|