Star 0

Talks

Title Humans
Oh No, Where's FIDO? - A Journey into Novel Web-Technology and U2F Exploitation Markus Vervier , Michele Orru , X41, D-Sec GmbH
From Assembly to Javascript and back: Turning Memory Corruption Errors into Code Execution with Client-Side Compilers Robert Gawlik , Ruhr University Bochum, Germany
Concolic Testing for Kernel Fuzzing and Vulnerability Discovery Vitaly Nikolenko
LINUX ASLR AND GNU LIBC: ADDRESS SPACE LAYOUT COMPUTING AND DEFENCE, AND ??STACK CANARY?? PROTECTION BYPASS Positive Technologies
Robin Hood vs Cisco ASA AnyConnect- Discovering and Exploiting a Vulnerability in your Firewall Cedric Halbronn , NCC Group's Exploit Development Group
The Smarts Behind Hacking Dumb Devices Maddie Stone , Google Inc.
New and Improved UMCI, Same Old Bugs James Forshaw , Google Project Zero
Field Report on a Zero-Day Machine Marco Bartoli , Fabian Yamaguchi
Surprise Rant
The Evolution of CFI Attacks and Defenses Joe Bialek , Microsoft MSRC Vulnerabilities and Mitigations Team
Dissecting QNX - Analyzing & Breaking QNX Exploit Mitigations and Secure Random Number Generators Jos Wetzels , Ali Abbasi , Midnight Blue Labs
Windows 10 RS2/RS3 GDI Data-Only Exploitation Tales CENSUS S.A.
Advancing the State of UEFI Bootkits: Persistence in the Age of PatchGuard and Windows 10 Alex Ionescu , CrowdStrike, Inc.
L'art de l'??vasion: Modern VMWare Exploitation Techniques Jasiel Spelman , Abdul-Aziz Hariri , Brian Gorenc , ZDI
Betraying the BIOS: Going Deeper into BIOS Guard Implementations Alex Matrosov , NVIDIA
Keynote Day 1 INSIDE THE MACHINE: HOW OFFENSIVE SECURITY IS DEFINING THE WAY WE COMPUTE DATA Rodrigo Branco