Oh No, Where's FIDO? - A Journey into Novel Web-Technology and U2F Exploitation
|
Markus Vervier
,
Michele Orru
,
X41, D-Sec GmbH
|
From Assembly to Javascript and back: Turning Memory Corruption Errors into Code Execution with Client-Side Compilers
|
Robert Gawlik
,
Ruhr University Bochum, Germany
|
Concolic Testing for Kernel Fuzzing and Vulnerability Discovery
|
Vitaly Nikolenko
|
LINUX ASLR AND GNU LIBC: ADDRESS SPACE LAYOUT COMPUTING AND DEFENCE, AND ??STACK CANARY?? PROTECTION BYPASS
|
Positive Technologies
|
Robin Hood vs Cisco ASA AnyConnect- Discovering and Exploiting a Vulnerability in your Firewall
|
Cedric Halbronn
,
NCC Group's Exploit Development Group
|
The Smarts Behind Hacking Dumb Devices
|
Maddie Stone
,
Google Inc.
|
New and Improved UMCI, Same Old Bugs
|
James Forshaw
,
Google Project Zero
|
Field Report on a Zero-Day Machine
|
Marco Bartoli
,
Fabian Yamaguchi
|
Surprise Rant
|
|
The Evolution of CFI Attacks and Defenses
|
Joe Bialek
,
Microsoft MSRC Vulnerabilities and Mitigations Team
|
Dissecting QNX - Analyzing & Breaking QNX Exploit Mitigations and Secure Random Number Generators
|
Jos Wetzels
,
Ali Abbasi
,
Midnight Blue Labs
|
Windows 10 RS2/RS3 GDI Data-Only Exploitation Tales
|
CENSUS S.A.
|
Advancing the State of UEFI Bootkits: Persistence in the Age of PatchGuard and Windows 10
|
Alex Ionescu
,
CrowdStrike, Inc.
|
L'art de l'??vasion: Modern VMWare Exploitation Techniques
|
Jasiel Spelman
,
Abdul-Aziz Hariri
,
Brian Gorenc
,
ZDI
|
Betraying the BIOS: Going Deeper into BIOS Guard Implementations
|
Alex Matrosov
,
NVIDIA
|
Keynote Day 1 INSIDE THE MACHINE: HOW OFFENSIVE SECURITY IS DEFINING THE WAY WE COMPUTE DATA
|
Rodrigo Branco
|