Star 0

Talks

Title Humans
Attacks on UEFI Security Rafal Wojtczuk , Corey Kallenberg
A new class of vulnerability in SMI Handlers of BIOS/UEFI Firmware Andrew Furtak , John Loucaides , Intel Corporation
FreeSentry: Protecting against use-after-free vulnerabilities due to dangling pointers Cisco Systems
DLL Hijacking' on OS X? #@%& Yeah! Patrick Wardle , Synack
How many million BIOSes would you like to infect? Xeno Kovah , Corey Kallenberg , LegbaCore
I see therefore I am.... You
Attacking WebKit Applications by exploiting memory corruption bugs Liang Chen , KeenTeam
Sexrets in LoadLibrary Yang Yu , Tencent, Inc.
NDIS Packet of Death: Turning Windows' Complexity Against Itself Nitay Artenstein
Userland Exploits of Pangu 8 Team Pangu , PanguTeam
From baseband to bitstream and back again: What security researchers really want to do with SDR Andy Davis , NCC Group
Credential Assessment: Mapping Privilege Escalation at Scale
Smart COM fuzzing tool - Explore More Sandbox Bypassing Surface in COM objects Haifei Li , Xiaoning Li , Intel Corporation
Project Zero: Making 0days Hard Chris Evans , Ben Hawkes , Google Inc.
Memminer: Real-Time Passive Volatile Memory Inspection Inside Virtual Machines
Wolf in Sheep's Clothing: Your Next APT is Already Whitelisted Fabio Assolini
Bootkit via SMS: 4G access level security assessment Timur Yunusov , Kirill Nesterov
UEFI, Open Platforms and the Defender's Dillema Vincent Zimmer , Intel Corporation
Taming wild copies: from hopeless crash to working exploit Chris Evans , Google Project Zero
There's Something About WMI Mandiant